builder: autoland_win7_vm-debug_test-web-platform-tests-e10s-9
slave: t-w732-spot-530
starttime: 1477587049.02
results: success (0)
buildid: 20161027075434
builduid: 0307270d1cd6493a98ca222289f3be1a
revision: 2d2a075ce1cd22f35f93534c80a09ef96f1149f7
========= Started set props: master (results: 0, elapsed: 0 secs) (at 2016-10-27 09:50:49.022616) =========
master: http://buildbot-master129.bb.releng.usw2.mozilla.com:8201/
========= Finished set props: master (results: 0, elapsed: 0 secs) (at 2016-10-27 09:50:49.023102) =========
========= Started downloading to buildprops.json (results: 0, elapsed: 0 secs) (at 2016-10-27 09:50:49.023414) =========
========= Finished downloading to buildprops.json (results: 0, elapsed: 0 secs) (at 2016-10-27 09:50:49.116454) =========
========= Started 'bash -c ...' (results: 0, elapsed: 0 secs) (at 2016-10-27 09:50:49.116989) =========
'bash' '-c' 'wget -Oarchiver_client.py --no-check-certificate --tries=10 --waitretry=3 https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py'
in dir c:\slave\test\. (timeout 1200 secs)
watching logfiles {}
argv: ['bash', '-c', 'wget -Oarchiver_client.py --no-check-certificate --tries=10 --waitretry=3 https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py']
environment:
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\cltbld\AppData\Roaming
BUILDBOT_PATH=C:\mozilla-build\
CHOCOLATEYINSTALL=C:\ProgramData\chocolatey
COMMONPROGRAMFILES=C:\Program Files\Common Files
COMPUTERNAME=T-W732-SPOT-530
COMSPEC=C:\windows\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
GIT_SHARE_BASE_DIR=/builds/git-shared
HG_SHARE_BASE_DIR=/builds/hg-shared
HOMEDRIVE=C:
HOMEPATH=\Users\cltbld
IDLEIZER_HALT_ON_IDLE=true
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOCALAPPDATA=C:\Users\cltbld\AppData\Local
LOG="c:\runner\buildbot-startup.log"
LOGONSERVER=\\T-W732-SPOT-530
MAKE_MODE=unix
MOZBUILDDIR=C:\mozilla-build
MOZILLABUILD=C:\mozilla-build
MOZ_TOOLS=C:\mozilla-build\moztools
MSYSTEM=MINGW32
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
PATH=C:\Program Files\NVIDIA Corporation\PhysX\Common;C:\windows\system32;C:\windows;C:\windows\System32\Wbem;C:\windows\System32\WindowsPowerShell\v1.0\;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;c:\Program Files\Microsoft Windows Performance Toolkit\;c:\mozilla-build\hg\;C:\Program Files (x86)\Microsoft SDKs\TypeScript\1.0\;C:\Program Files (x86)\Puppet Labs\Puppet\bin;C:\Program Files (x86)\Puppet Labs\Puppet\facter\bin;C:\Program Files (x86)\Puppet Labs\Puppet\hiera\bin;C:\Program Files (x86)\Puppet Labs\Puppet\puppet\bin;C:\Program Files (x86)\Puppet Labs\Puppet\sys\ruby\bin;C:\Program Files (x86)\Puppet Labs\Puppet\sys\tools\bin;C:\Program Files (x86)\Windows Kits\8.0\Windows Performance Toolkit\;C:\Program Files (x86)\Windows Kits\8.1\Windows Performance Toolkit\;C:\Program Files\Amazon\cfn-bootstrap\;C:\Program Files\Microsoft SQL Server\110\Tools\Binn\;C:\mozilla-build\buildbotve;C:\mozilla-build\msys\bin;C:\mozilla-build\msys\local\bin;C:\mozilla-build\msys\mingw\bin;C:\mozilla-build\python27;C:\opt\runner;c:\Program Files (x86)\Microsoft SQL Server\100\Tools\Binn\;c:\Program Files\Microsoft SQL Server\100\DTS\Binn\;c:\Program Files\Microsoft SQL Server\100\Tools\Binn;C:\Users\cltbld\AppData\Local\Programs\Common\Microsoft\Visual C++ for Python\9.0;;C:\mozilla-build\moztools\bin
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_IDENTIFIER=x86 Family 6 Model 62 Stepping 4, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=3e04
PROGRAMDATA=C:\ProgramData
PROGRAMFILES=C:\Program Files
PROMPT=$P$G
PSMODULEPATH=C:\windows\system32\WindowsPowerShell\v1.0\Modules\;C:\Program Files\AWS Tools\PowerShell\
PUBLIC=C:\Users\Public
PWD=c:\slave\test
RUNNER_CONFIG_CMD=C:\opt\runner\Scripts\python2.7.exe C:\opt\runner\Scripts\runner-script.py -c c:\opt\runner\runner.cfg
SYSTEMDRIVE=C:
SYSTEMROOT=C:\windows
TEMP=C:\Users\cltbld\AppData\Local\Temp
TEST1=testie
TMP=C:\Users\cltbld\AppData\Local\Temp
USERDOMAIN=T-W732-SPOT-530
USERNAME=cltbld
USERPROFILE=C:\Users\cltbld
WINDIR=C:\windows
WINDOWS_TRACING_FLAGS=3
WINDOWS_TRACING_LOGFILE=C:\BVTBin\Tests\installpackage\csilogfile.log
using PTY: False
--09:50:47-- https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py
=> `archiver_client.py'
Resolving hg.mozilla.org... 63.245.215.25, 63.245.215.102
Connecting to hg.mozilla.org|63.245.215.25|:443... connected.
WARNING: Certificate verification error for hg.mozilla.org: certificate signature failure
HTTP request sent, awaiting response... 200 Script output follows
Length: 12,179 (12K) [text/x-python]
0K .......... . 100% 23.17 MB/s
09:50:47 (23.17 MB/s) - `archiver_client.py' saved [12179/12179]
program finished with exit code 0
elapsedTime=0.379000
========= master_lag: 0.02 =========
========= Finished 'bash -c ...' (results: 0, elapsed: 0 secs) (at 2016-10-27 09:50:49.514476) =========
========= Started 'rm -rf ...' (results: 0, elapsed: 3 secs) (at 2016-10-27 09:50:49.515392) =========
'rm' '-rf' 'scripts' 'properties'
in dir c:\slave\test\. (timeout 1200 secs)
watching logfiles {}
argv: ['rm', '-rf', 'scripts', 'properties']
environment:
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\cltbld\AppData\Roaming
BUILDBOT_PATH=C:\mozilla-build\
CHOCOLATEYINSTALL=C:\ProgramData\chocolatey
COMMONPROGRAMFILES=C:\Program Files\Common Files
COMPUTERNAME=T-W732-SPOT-530
COMSPEC=C:\windows\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
GIT_SHARE_BASE_DIR=/builds/git-shared
HG_SHARE_BASE_DIR=/builds/hg-shared
HOMEDRIVE=C:
HOMEPATH=\Users\cltbld
IDLEIZER_HALT_ON_IDLE=true
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOCALAPPDATA=C:\Users\cltbld\AppData\Local
LOG="c:\runner\buildbot-startup.log"
LOGONSERVER=\\T-W732-SPOT-530
MAKE_MODE=unix
MOZBUILDDIR=C:\mozilla-build
MOZILLABUILD=C:\mozilla-build
MOZ_TOOLS=C:\mozilla-build\moztools
MSYSTEM=MINGW32
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
PATH=C:\Program Files\NVIDIA Corporation\PhysX\Common;C:\windows\system32;C:\windows;C:\windows\System32\Wbem;C:\windows\System32\WindowsPowerShell\v1.0\;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;c:\Program Files\Microsoft Windows Performance Toolkit\;c:\mozilla-build\hg\;C:\Program Files (x86)\Microsoft SDKs\TypeScript\1.0\;C:\Program Files (x86)\Puppet Labs\Puppet\bin;C:\Program Files (x86)\Puppet Labs\Puppet\facter\bin;C:\Program Files (x86)\Puppet Labs\Puppet\hiera\bin;C:\Program Files (x86)\Puppet Labs\Puppet\puppet\bin;C:\Program Files (x86)\Puppet Labs\Puppet\sys\ruby\bin;C:\Program Files (x86)\Puppet Labs\Puppet\sys\tools\bin;C:\Program Files (x86)\Windows Kits\8.0\Windows Performance Toolkit\;C:\Program Files (x86)\Windows Kits\8.1\Windows Performance Toolkit\;C:\Program Files\Amazon\cfn-bootstrap\;C:\Program Files\Microsoft SQL Server\110\Tools\Binn\;C:\mozilla-build\buildbotve;C:\mozilla-build\msys\bin;C:\mozilla-build\msys\local\bin;C:\mozilla-build\msys\mingw\bin;C:\mozilla-build\python27;C:\opt\runner;c:\Program Files (x86)\Microsoft SQL Server\100\Tools\Binn\;c:\Program Files\Microsoft SQL Server\100\DTS\Binn\;c:\Program Files\Microsoft SQL Server\100\Tools\Binn;C:\Users\cltbld\AppData\Local\Programs\Common\Microsoft\Visual C++ for Python\9.0;;C:\mozilla-build\moztools\bin
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_IDENTIFIER=x86 Family 6 Model 62 Stepping 4, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=3e04
PROGRAMDATA=C:\ProgramData
PROGRAMFILES=C:\Program Files
PROMPT=$P$G
PSMODULEPATH=C:\windows\system32\WindowsPowerShell\v1.0\Modules\;C:\Program Files\AWS Tools\PowerShell\
PUBLIC=C:\Users\Public
PWD=c:\slave\test
RUNNER_CONFIG_CMD=C:\opt\runner\Scripts\python2.7.exe C:\opt\runner\Scripts\runner-script.py -c c:\opt\runner\runner.cfg
SYSTEMDRIVE=C:
SYSTEMROOT=C:\windows
TEMP=C:\Users\cltbld\AppData\Local\Temp
TEST1=testie
TMP=C:\Users\cltbld\AppData\Local\Temp
USERDOMAIN=T-W732-SPOT-530
USERNAME=cltbld
USERPROFILE=C:\Users\cltbld
WINDIR=C:\windows
WINDOWS_TRACING_FLAGS=3
WINDOWS_TRACING_LOGFILE=C:\BVTBin\Tests\installpackage\csilogfile.log
using PTY: False
program finished with exit code 0
elapsedTime=3.101000
========= master_lag: 0.02 =========
========= Finished 'rm -rf ...' (results: 0, elapsed: 3 secs) (at 2016-10-27 09:50:52.633629) =========
========= Started 'bash -c ...' (results: 0, elapsed: 1 secs) (at 2016-10-27 09:50:52.634002) =========
'bash' '-c' u'python archiver_client.py mozharness --repo integration/autoland --rev 2d2a075ce1cd22f35f93534c80a09ef96f1149f7 --destination scripts --debug'
in dir c:\slave\test\. (timeout 1200 secs)
watching logfiles {}
argv: ['bash', '-c', u'python archiver_client.py mozharness --repo integration/autoland --rev 2d2a075ce1cd22f35f93534c80a09ef96f1149f7 --destination scripts --debug']
environment:
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\cltbld\AppData\Roaming
BUILDBOT_PATH=C:\mozilla-build\
CHOCOLATEYINSTALL=C:\ProgramData\chocolatey
COMMONPROGRAMFILES=C:\Program Files\Common Files
COMPUTERNAME=T-W732-SPOT-530
COMSPEC=C:\windows\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
GIT_SHARE_BASE_DIR=/builds/git-shared
HG_SHARE_BASE_DIR=/builds/hg-shared
HOMEDRIVE=C:
HOMEPATH=\Users\cltbld
IDLEIZER_HALT_ON_IDLE=true
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOCALAPPDATA=C:\Users\cltbld\AppData\Local
LOG="c:\runner\buildbot-startup.log"
LOGONSERVER=\\T-W732-SPOT-530
MAKE_MODE=unix
MOZBUILDDIR=C:\mozilla-build
MOZILLABUILD=C:\mozilla-build
MOZ_TOOLS=C:\mozilla-build\moztools
MSYSTEM=MINGW32
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
PATH=C:\Program Files\NVIDIA Corporation\PhysX\Common;C:\windows\system32;C:\windows;C:\windows\System32\Wbem;C:\windows\System32\WindowsPowerShell\v1.0\;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;c:\Program Files\Microsoft Windows Performance Toolkit\;c:\mozilla-build\hg\;C:\Program Files (x86)\Microsoft SDKs\TypeScript\1.0\;C:\Program Files (x86)\Puppet Labs\Puppet\bin;C:\Program Files (x86)\Puppet Labs\Puppet\facter\bin;C:\Program Files (x86)\Puppet Labs\Puppet\hiera\bin;C:\Program Files (x86)\Puppet Labs\Puppet\puppet\bin;C:\Program Files (x86)\Puppet Labs\Puppet\sys\ruby\bin;C:\Program Files (x86)\Puppet Labs\Puppet\sys\tools\bin;C:\Program Files (x86)\Windows Kits\8.0\Windows Performance Toolkit\;C:\Program Files (x86)\Windows Kits\8.1\Windows Performance Toolkit\;C:\Program Files\Amazon\cfn-bootstrap\;C:\Program Files\Microsoft SQL Server\110\Tools\Binn\;C:\mozilla-build\buildbotve;C:\mozilla-build\msys\bin;C:\mozilla-build\msys\local\bin;C:\mozilla-build\msys\mingw\bin;C:\mozilla-build\python27;C:\opt\runner;c:\Program Files (x86)\Microsoft SQL Server\100\Tools\Binn\;c:\Program Files\Microsoft SQL Server\100\DTS\Binn\;c:\Program Files\Microsoft SQL Server\100\Tools\Binn;C:\Users\cltbld\AppData\Local\Programs\Common\Microsoft\Visual C++ for Python\9.0;;C:\mozilla-build\moztools\bin
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_IDENTIFIER=x86 Family 6 Model 62 Stepping 4, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=3e04
PROGRAMDATA=C:\ProgramData
PROGRAMFILES=C:\Program Files
PROMPT=$P$G
PSMODULEPATH=C:\windows\system32\WindowsPowerShell\v1.0\Modules\;C:\Program Files\AWS Tools\PowerShell\
PUBLIC=C:\Users\Public
PWD=c:\slave\test
RUNNER_CONFIG_CMD=C:\opt\runner\Scripts\python2.7.exe C:\opt\runner\Scripts\runner-script.py -c c:\opt\runner\runner.cfg
SYSTEMDRIVE=C:
SYSTEMROOT=C:\windows
TEMP=C:\Users\cltbld\AppData\Local\Temp
TEST1=testie
TMP=C:\Users\cltbld\AppData\Local\Temp
USERDOMAIN=T-W732-SPOT-530
USERNAME=cltbld
USERPROFILE=C:\Users\cltbld
WINDIR=C:\windows
WINDOWS_TRACING_FLAGS=3
WINDOWS_TRACING_LOGFILE=C:\BVTBin\Tests\installpackage\csilogfile.log
using PTY: False
2016-10-27 09:50:51,155 truncating revision to first 12 chars
2016-10-27 09:50:51,155 Setting DEBUG logging.
2016-10-27 09:50:51,155 attempt 1/10
2016-10-27 09:50:51,155 Getting archive location from https://api.pub.build.mozilla.org/archiver/hgmo/integration/autoland/2d2a075ce1cd?&preferred_region=us-west-2&suffix=tar.gz&subdir=testing/mozharness
2016-10-27 09:50:52,365 unpacking tar archive at: autoland-2d2a075ce1cd/testing/mozharness/
2016-10-27 09:50:52,507 skipping symlink on windows: configs/single_locale/linux32.py
program finished with exit code 0
elapsedTime=1.895000
========= master_lag: 0.02 =========
========= Finished 'bash -c ...' (results: 0, elapsed: 1 secs) (at 2016-10-27 09:50:54.547998) =========
========= Started set props: script_repo_revision (results: 0, elapsed: 0 secs) (at 2016-10-27 09:50:54.548701) =========
script_repo_revision: 2d2a075ce1cd22f35f93534c80a09ef96f1149f7
========= Finished set props: script_repo_revision (results: 0, elapsed: 0 secs) (at 2016-10-27 09:50:54.549813) =========
========= Started downloading to oauth.txt (results: 0, elapsed: 0 secs) (at 2016-10-27 09:50:54.550485) =========
========= Finished downloading to oauth.txt (results: 0, elapsed: 0 secs) (at 2016-10-27 09:50:54.566635) =========
========= Started 'c:/mozilla-build/python27/python -u ...' (results: 0, elapsed: 1 hrs, 6 secs) (at 2016-10-27 09:50:54.566915) =========
'c:/mozilla-build/python27/python' '-u' 'scripts/scripts/web_platform_tests.py' '--cfg' 'web_platform_tests/prod_config_windows.py' '--test-type=testharness' '--e10s' '--total-chunks' '10' '--this-chunk' '9' '--blob-upload-branch' 'autoland' '--download-symbols' 'true'
in dir c:\slave\test\. (timeout 1800 secs) (maxTime 7200 secs)
watching logfiles {}
argv: ['c:/mozilla-build/python27/python', '-u', 'scripts/scripts/web_platform_tests.py', '--cfg', 'web_platform_tests/prod_config_windows.py', '--test-type=testharness', '--e10s', '--total-chunks', '10', '--this-chunk', '9', '--blob-upload-branch', 'autoland', '--download-symbols', 'true']
environment:
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\cltbld\AppData\Roaming
BUILDBOT_PATH=C:\mozilla-build\
CHOCOLATEYINSTALL=C:\ProgramData\chocolatey
COMMONPROGRAMFILES=C:\Program Files\Common Files
COMPUTERNAME=T-W732-SPOT-530
COMSPEC=C:\windows\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
DevEnvDir=D:\msvs8\Common7\IDE
FP_NO_HOST_CHECK=NO
FrameworkDir=C:\WINDOWS\Microsoft.NET\Framework
FrameworkSDKDir=D:\msvs8\SDK\v2.0
FrameworkVersion=v2.0.50727
GIT_SHARE_BASE_DIR=/builds/git-shared
HG_SHARE_BASE_DIR=/builds/hg-shared
HOMEDRIVE=C:
HOMEPATH=\Users\cltbld
IDLEIZER_HALT_ON_IDLE=true
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LIBPATH=C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727;D:\msvs8\VC\ATLMFC\LIB
LOCALAPPDATA=C:\Users\cltbld\AppData\Local
LOG="c:\runner\buildbot-startup.log"
LOGONSERVER=\\T-W732-SPOT-530
MAKE_MODE=unix
MOZBUILDDIR=C:\mozilla-build
MOZILLABUILD=D:\mozilla-build
MOZILLABUILDDRIVE=C:
MOZILLABUILDPATH=\mozilla-build\
MOZ_AIRBAG=1
MOZ_CRASHREPORTER_NO_REPORT=1
MOZ_HIDE_RESULTS_TABLE=1
MOZ_MSVCVERSION=8
MOZ_NO_REMOTE=1
MOZ_TOOLS=D:\mozilla-build\moztools
MSVCDir=D:\msvs8\VC
MSYSTEM=MINGW32
NO_EM_RESTART=1
NO_FAIL_ON_TEST_ERRORS=1
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
PATH=C:\Program Files\NVIDIA Corporation\PhysX\Common;C:\windows\system32;C:\windows;C:\windows\System32\Wbem;C:\windows\System32\WindowsPowerShell\v1.0\;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;c:\Program Files\Microsoft Windows Performance Toolkit\;c:\mozilla-build\hg\;C:\Program Files (x86)\Microsoft SDKs\TypeScript\1.0\;C:\Program Files (x86)\Puppet Labs\Puppet\bin;C:\Program Files (x86)\Puppet Labs\Puppet\facter\bin;C:\Program Files (x86)\Puppet Labs\Puppet\hiera\bin;C:\Program Files (x86)\Puppet Labs\Puppet\puppet\bin;C:\Program Files (x86)\Puppet Labs\Puppet\sys\ruby\bin;C:\Program Files (x86)\Puppet Labs\Puppet\sys\tools\bin;C:\Program Files (x86)\Windows Kits\8.0\Windows Performance Toolkit\;C:\Program Files (x86)\Windows Kits\8.1\Windows Performance Toolkit\;C:\Program Files\Amazon\cfn-bootstrap\;C:\Program Files\Microsoft SQL Server\110\Tools\Binn\;C:\mozilla-build\buildbotve;C:\mozilla-build\msys\bin;C:\mozilla-build\msys\local\bin;C:\mozilla-build\msys\mingw\bin;C:\mozilla-build\python27;C:\opt\runner;c:\Program Files (x86)\Microsoft SQL Server\100\Tools\Binn\;c:\Program Files\Microsoft SQL Server\100\DTS\Binn\;c:\Program Files\Microsoft SQL Server\100\Tools\Binn;C:\Users\cltbld\AppData\Local\Programs\Common\Microsoft\Visual C++ for Python\9.0;;C:\mozilla-build\moztools\bin
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_IDENTIFIER=x86 Family 6 Model 62 Stepping 4, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=3e04
PROGRAMDATA=C:\ProgramData
PROGRAMFILES=C:\Program Files
PROMPT=$P$G
PROPERTIES_FILE=C:\slave\test/buildprops.json
PSMODULEPATH=C:\windows\system32\WindowsPowerShell\v1.0\Modules\;C:\Program Files\AWS Tools\PowerShell\
PUBLIC=C:\Users\Public
PWD=c:\slave\test
RUNNER_CONFIG_CMD=C:\opt\runner\Scripts\python2.7.exe C:\opt\runner\Scripts\runner-script.py -c c:\opt\runner\runner.cfg
SYSTEMDRIVE=C:
SYSTEMROOT=C:\windows
TEMP=C:\Users\cltbld\AppData\Local\Temp
TEST1=testie
TMP=C:\Users\cltbld\AppData\Local\Temp
USERDOMAIN=T-W732-SPOT-530
USERNAME=cltbld
USERPROFILE=C:\Users\cltbld
VCINSTALLDIR=D:\msvs8\VC
VCVARS=D:\msvs8\VC\bin\vcvars32.bat
VSINSTALLDIR=D:\msvs8
WINDIR=C:\windows
WINDOWS_TRACING_FLAGS=3
WINDOWS_TRACING_LOGFILE=C:\BVTBin\Tests\installpackage\csilogfile.log
XPCOM_DEBUG_BREAK=warn
using PTY: False
09:50:53 INFO - MultiFileLogger online at 20161027 09:50:53 in c:\slave\test
09:50:53 INFO - Run as scripts/scripts/web_platform_tests.py --cfg web_platform_tests/prod_config_windows.py --test-type=testharness --e10s --total-chunks 10 --this-chunk 9 --blob-upload-branch autoland --download-symbols true
09:50:53 INFO - Dumping config to c:\slave\test\logs\localconfig.json.
09:50:53 INFO - {'allow_software_gl_layers': False,
09:50:53 INFO - 'append_to_log': False,
09:50:53 INFO - 'base_work_dir': 'c:\\slave\\test',
09:50:53 INFO - 'blob_upload_branch': 'autoland',
09:50:53 INFO - 'blob_uploader_auth_file': 'c:\\slave\\test\\oauth.txt',
09:50:53 INFO - 'buildbot_json_path': 'buildprops.json',
09:50:53 INFO - 'config_files': ('web_platform_tests/prod_config_windows.py',),
09:50:53 INFO - 'default_blob_upload_servers': ('https://blobupload.elasticbeanstalk.com',),
09:50:53 INFO - 'download_minidump_stackwalk': True,
09:50:53 INFO - 'download_symbols': 'true',
09:50:53 INFO - 'e10s': True,
09:50:53 INFO - 'exes': {'hg': 'c:/mozilla-build/hg/hg',
09:50:53 INFO - 'mozinstall': ('c:\\slave\\test/build/venv/scripts/python',
09:50:53 INFO - 'c:\\slave\\test/build/venv/scripts/mozinstall-script.py'),
09:50:53 INFO - 'python': 'c:\\mozilla-build\\python27\\python.exe',
09:50:53 INFO - 'tooltool.py': ('c:\\mozilla-build\\python27\\python.exe',
09:50:53 INFO - 'C:/mozilla-build/tooltool.py'),
09:50:53 INFO - 'virtualenv': ('c:\\mozilla-build\\python27\\python.exe',
09:50:53 INFO - 'c:/mozilla-build/buildbotve/virtualenv.py')},
09:50:53 INFO - 'find_links': ('http://pypi.pvt.build.mozilla.org/pub',
09:50:53 INFO - 'http://pypi.pub.build.mozilla.org/pub'),
09:50:53 INFO - 'log_level': 'info',
09:50:53 INFO - 'log_to_console': True,
09:50:53 INFO - 'opt_config_files': (),
09:50:53 INFO - 'options': ('--prefs-root=%(test_path)s/prefs',
09:50:53 INFO - '--processes=1',
09:50:53 INFO - '--config=%(test_path)s/wptrunner.ini',
09:50:53 INFO - '--ca-cert-path=%(test_path)s/certs/cacert.pem',
09:50:53 INFO - '--host-key-path=%(test_path)s/certs/web-platform.test.key',
09:50:53 INFO - '--host-cert-path=%(test_path)s/certs/web-platform.test.pem',
09:50:53 INFO - '--certutil-binary=%(test_install_path)s/bin/certutil'),
09:50:53 INFO - 'pip_index': False,
09:50:53 INFO - 'require_test_zip': True,
09:50:53 INFO - 'test_type': ('testharness',),
09:50:53 INFO - 'this_chunk': '9',
09:50:53 INFO - 'total_chunks': '10',
09:50:53 INFO - 'virtualenv_path': 'venv',
09:50:53 INFO - 'volatile_config': {'actions': None, 'add_actions': None, 'no_actions': None},
09:50:53 INFO - 'work_dir': 'build'}
09:50:53 INFO - [mozharness: 2016-10-27 16:50:53.326000Z] Running clobber step.
09:50:53 INFO - Running pre-action listener: _resource_record_pre_action
09:50:53 INFO - Running main action method: clobber
09:50:53 INFO - rmtree: c:\slave\test\build
09:50:53 INFO - Using _rmtree_windows ...
09:50:53 INFO - retry: Calling _rmtree_windows with args: ('c:\\slave\\test\\build',), kwargs: {}, attempt #1
09:52:13 INFO - Running post-action listener: _resource_record_post_action
09:52:13 INFO - [mozharness: 2016-10-27 16:52:13.952000Z] Finished clobber step (success)
09:52:13 INFO - [mozharness: 2016-10-27 16:52:13.952000Z] Running read-buildbot-config step.
09:52:13 INFO - Running pre-action listener: _resource_record_pre_action
09:52:13 INFO - Running main action method: read_buildbot_config
09:52:13 INFO - Using buildbot properties:
09:52:13 INFO - {
09:52:13 INFO - "project": "",
09:52:13 INFO - "product": "firefox",
09:52:13 INFO - "script_repo_revision": "production",
09:52:13 INFO - "scheduler": "tests-autoland-win7_vm-debug-unittest",
09:52:13 INFO - "repository": "",
09:52:13 INFO - "buildername": "Windows 7 VM 32-bit autoland debug test web-platform-tests-e10s-9",
09:52:13 INFO - "buildid": "20161027075434",
09:52:13 INFO - "pgo_build": "False",
09:52:13 INFO - "basedir": "C:\\slave\\test",
09:52:13 INFO - "buildnumber": 168,
09:52:13 INFO - "slavename": "t-w732-spot-530",
09:52:13 INFO - "revision": "2d2a075ce1cd22f35f93534c80a09ef96f1149f7",
09:52:13 INFO - "master": "http://buildbot-master129.bb.releng.usw2.mozilla.com:8201/",
09:52:13 INFO - "platform": "win32",
09:52:13 INFO - "branch": "autoland",
09:52:13 INFO - "repo_path": "integration/autoland",
09:52:13 INFO - "moz_repo_path": "",
09:52:13 INFO - "stage_platform": "win32",
09:52:13 INFO - "builduid": "0307270d1cd6493a98ca222289f3be1a",
09:52:13 INFO - "slavebuilddir": "test"
09:52:13 INFO - }
09:52:13 INFO - Found a test packages url https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.test_packages.json.
09:52:13 INFO - Found installer url https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.zip.
09:52:13 INFO - Running post-action listener: _resource_record_post_action
09:52:13 INFO - [mozharness: 2016-10-27 16:52:13.955000Z] Finished read-buildbot-config step (success)
09:52:13 INFO - [mozharness: 2016-10-27 16:52:13.955000Z] Running download-and-extract step.
09:52:13 INFO - Running pre-action listener: _resource_record_pre_action
09:52:13 INFO - Running main action method: download_and_extract
09:52:13 INFO - mkdir: c:\slave\test\build\tests
09:52:13 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:52:13 INFO - trying https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.test_packages.json
09:52:13 INFO - Downloading https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.test_packages.json to c:\slave\test\build\firefox-52.0a1.en-US.win32.test_packages.json
09:52:13 INFO - retry: Calling _download_file with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.test_packages.json', 'file_name': 'c:\\slave\\test\\build\\firefox-52.0a1.en-US.win32.test_packages.json'}, attempt #1
09:52:15 INFO - Downloaded 1274 bytes.
09:52:15 INFO - Reading from file c:\slave\test\build\firefox-52.0a1.en-US.win32.test_packages.json
09:52:15 INFO - Using the following test package requirements:
09:52:15 INFO - {u'common': [u'firefox-52.0a1.en-US.win32.common.tests.zip'],
09:52:15 INFO - u'cppunittest': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
09:52:15 INFO - u'firefox-52.0a1.en-US.win32.cppunittest.tests.zip'],
09:52:15 INFO - u'gtest': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
09:52:15 INFO - u'firefox-52.0a1.en-US.win32.gtest.tests.zip'],
09:52:15 INFO - u'jittest': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
09:52:15 INFO - u'jsshell-win32.zip'],
09:52:15 INFO - u'mochitest': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
09:52:15 INFO - u'firefox-52.0a1.en-US.win32.mochitest.tests.zip'],
09:52:15 INFO - u'mozbase': [u'firefox-52.0a1.en-US.win32.common.tests.zip'],
09:52:15 INFO - u'reftest': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
09:52:15 INFO - u'firefox-52.0a1.en-US.win32.reftest.tests.zip'],
09:52:15 INFO - u'talos': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
09:52:15 INFO - u'firefox-52.0a1.en-US.win32.talos.tests.zip'],
09:52:15 INFO - u'web-platform': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
09:52:15 INFO - u'firefox-52.0a1.en-US.win32.web-platform.tests.zip'],
09:52:15 INFO - u'xpcshell': [u'firefox-52.0a1.en-US.win32.common.tests.zip',
09:52:15 INFO - u'firefox-52.0a1.en-US.win32.xpcshell.tests.zip']}
09:52:15 INFO - Downloading packages: [u'firefox-52.0a1.en-US.win32.common.tests.zip', u'firefox-52.0a1.en-US.win32.web-platform.tests.zip'] for test suite category: web-platform
09:52:15 INFO - Downloading and extracting to c:\slave\test\build\tests these dirs bin/*, config/*, mozbase/*, marionette/*, tools/wptserve/*, web-platform/* from https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.common.tests.zip
09:52:15 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': u'https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.common.tests.zip'}, attempt #1
09:52:15 INFO - Fetch https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.common.tests.zip into memory
09:52:16 INFO - Http code: 200
09:52:16 INFO - via: 1.1 0cf1d7257c633ae75623c5e75bf3805e.cloudfront.net (CloudFront)
09:52:16 INFO - x-amz-cf-id: 3kzY49nITNMm1KAN-w6YX_D6LOsv_3RGikCtEw0ATw0jS-ppMaBUoA==
09:52:16 INFO - x-amz-version-id: tlpWf_qzosk3FAXU0rvZtrKs86arhSHS
09:52:17 INFO - Expected file size: 18749717
09:52:17 INFO - Obtained file size: 18749717
09:52:18 INFO - Downloading and extracting to c:\slave\test\build\tests these dirs bin/*, config/*, mozbase/*, marionette/*, tools/wptserve/*, web-platform/* from https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.web-platform.tests.zip
09:52:18 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': u'https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.web-platform.tests.zip'}, attempt #1
09:52:18 INFO - Fetch https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.web-platform.tests.zip into memory
09:52:19 INFO - Http code: 200
09:52:19 INFO - via: 1.1 d897b81191cbfd68a1b6fc44f98c52b0.cloudfront.net (CloudFront)
09:52:19 INFO - x-amz-cf-id: CqyUVXGmOQ0h3kR3w5ZijGX2LaP1rpnM4i5g-UxN8P-uljbdWzeQHg==
09:52:19 INFO - x-amz-version-id: 0mxPRbOqmhJlWg8H3J8rCmMeQUmJjjsT
09:52:20 INFO - Expected file size: 43222965
09:52:20 INFO - Obtained file size: 43222965
09:52:50 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:52:50 INFO - trying https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.zip
09:52:50 INFO - Downloading https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.zip to c:\slave\test\build\firefox-52.0a1.en-US.win32.zip
09:52:50 INFO - retry: Calling _download_file with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.zip', 'file_name': 'c:\\slave\\test\\build\\firefox-52.0a1.en-US.win32.zip'}, attempt #1
09:52:53 INFO - Downloaded 66392284 bytes.
09:52:53 INFO - Setting buildbot property build_url to https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.zip
09:52:53 INFO - mkdir: c:\slave\test\properties
09:52:53 INFO - Writing buildbot properties ['build_url'] to c:\slave\test\properties\build_url
09:52:53 INFO - Writing to file c:\slave\test\properties\build_url
09:52:53 INFO - Contents:
09:52:53 INFO - build_url:https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.zip
09:52:53 INFO - retry: Calling query_symbols_url with args: (), kwargs: {}, attempt #1
09:52:54 INFO - Setting buildbot property symbols_url to https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip
09:52:54 INFO - Writing buildbot properties ['symbols_url'] to c:\slave\test\properties\symbols_url
09:52:54 INFO - Writing to file c:\slave\test\properties\symbols_url
09:52:54 INFO - Contents:
09:52:54 INFO - symbols_url:https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip
09:52:54 INFO - Downloading and extracting to c:\slave\test\build\symbols these dirs * from https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip
09:52:54 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip'}, attempt #1
09:52:54 INFO - Fetch https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip into memory
09:52:55 INFO - Http code: 200
09:52:55 INFO - via: 1.1 e30ae5b3d9f6779a9b8bc992faad0b09.cloudfront.net (CloudFront)
09:52:55 INFO - x-amz-cf-id: W0plLJcKECvtHXdpIybZMFuWeaoy9iC5fZcvv1euMTTuraoR_L2ehg==
09:52:55 INFO - x-amz-version-id: 2caWIzVFm7j348BBN2RJfVRjrh6WGpdv
09:52:57 INFO - Expected file size: 67670176
09:52:57 INFO - Obtained file size: 67670176
09:53:00 INFO - Running post-action listener: _resource_record_post_action
09:53:00 INFO - Running post-action listener: set_extra_try_arguments
09:53:00 INFO - [mozharness: 2016-10-27 16:53:00.522000Z] Finished download-and-extract step (success)
09:53:00 INFO - [mozharness: 2016-10-27 16:53:00.522000Z] Running fetch-geckodriver step.
09:53:00 INFO - Running pre-action listener: _resource_record_pre_action
09:53:00 INFO - Running main action method: fetch_geckodriver
09:53:00 INFO - Running post-action listener: _resource_record_post_action
09:53:00 INFO - [mozharness: 2016-10-27 16:53:00.522000Z] Finished fetch-geckodriver step (success)
09:53:00 INFO - [mozharness: 2016-10-27 16:53:00.522000Z] Running create-virtualenv step.
09:53:00 INFO - Running pre-action listener: _pre_create_virtualenv
09:53:00 INFO - Running pre-action listener: _resource_record_pre_action
09:53:00 INFO - Running main action method: create_virtualenv
09:53:00 INFO - Creating virtualenv c:\slave\test\build\venv
09:53:00 INFO - Running command: ['c:\\mozilla-build\\python27\\python.exe', 'c:/mozilla-build/buildbotve/virtualenv.py', '--no-site-packages', '--distribute', 'c:\\slave\\test\\build\\venv'] in c:\slave\test\build
09:53:00 INFO - Copy/paste: c:\mozilla-build\python27\python.exe c:/mozilla-build/buildbotve/virtualenv.py --no-site-packages --distribute c:\slave\test\build\venv
09:53:03 INFO - New python executable in c:\slave\test\build\venv\Scripts\python.exe
09:53:06 INFO - Installing distribute......................................................................................................................................................................................done.
09:53:07 INFO - Return code: 0
09:53:07 INFO - Getting output from command: ['c:\\slave\\test\\build\\venv\\Scripts\\pip', '--version']
09:53:07 INFO - Copy/paste: c:\slave\test\build\venv\Scripts\pip --version
09:53:08 INFO - Reading from file tmpfile_stdout
09:53:08 INFO - Output received:
09:53:08 INFO - pip 0.8.2 from c:\slave\test\build\venv\lib\site-packages\pip-0.8.2-py2.7.egg (python 2.7)
09:53:08 INFO - Using _rmtree_windows ...
09:53:08 INFO - Using _rmtree_windows ...
09:53:08 INFO - Installing psutil>=3.1.1 into virtualenv c:\slave\test\build\venv
09:53:08 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:53:08 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
09:53:08 INFO - URL Candidate: http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub
09:53:08 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:53:08 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
09:53:08 INFO - URL Candidate: http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub
09:53:08 INFO - retry: Calling run_command with args: [['c:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'psutil>=3.1.1']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x01CB72C0>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01CDB020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x01DB49F0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0125FDE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01D14180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x01CC6480>, 'level': 'critical'}], 'cwd': 'c:\\slave\\test\\build', 'env': {'TMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-W732-SPOT-530', 'LOG': '"c:\\runner\\buildbot-startup.log"', 'USERDOMAIN': 'T-W732-SPOT-530', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\;C:\\Program Files\\AWS Tools\\PowerShell\\', 'CHOCOLATEYINSTALL': 'C:\\ProgramData\\chocolatey', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 62 Stepping 4, GenuineIntel', 'LOGONSERVER': '\\\\T-W732-SPOT-530', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '3e04', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'NO_EM_RESTART': '1', 'WINDOWS_TRACING_FLAGS': '3', 'MOZ_HIDE_RESULTS_TABLE': '1', 'MAKE_MODE': 'unix', 'XPCOM_DEBUG_BREAK': 'warn', 'WINDOWS_TRACING_LOGFILE': 'C:\\BVTBin\\Tests\\installpackage\\csilogfile.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'MOZILLABUILDDRIVE': 'C:', 'LOCALAPPDATA': 'C:\\Users\\cltbld\\AppData\\Local', 'IDLEIZER_HALT_ON_IDLE': 'true', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MSYSTEM': 'MINGW32', 'MOZBUILDDIR': 'C:\\mozilla-build', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'RUNNER_CONFIG_CMD': 'C:\\opt\\runner\\Scripts\\python2.7.exe C:\\opt\\runner\\Scripts\\runner-script.py -c c:\\opt\\runner\\runner.cfg', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'MSVCDIR': 'D:\\msvs8\\VC', 'PROGRAMDATA': 'C:\\ProgramData', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;c:\\Program Files\\Microsoft Windows Performance Toolkit\\;c:\\mozilla-build\\hg\\;C:\\Program Files (x86)\\Microsoft SDKs\\TypeScript\\1.0\\;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\facter\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\hiera\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\ruby\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\tools\\bin;C:\\Program Files (x86)\\Windows Kits\\8.0\\Windows Performance Toolkit\\;C:\\Program Files (x86)\\Windows Kits\\8.1\\Windows Performance Toolkit\\;C:\\Program Files\\Amazon\\cfn-bootstrap\\;C:\\Program Files\\Microsoft SQL Server\\110\\Tools\\Binn\\;C:\\mozilla-build\\buildbotve;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\msys\\local\\bin;C:\\mozilla-build\\msys\\mingw\\bin;C:\\mozilla-build\\python27;C:\\opt\\runner;c:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\Tools\\Binn;C:\\Users\\cltbld\\AppData\\Local\\Programs\\Common\\Microsoft\\Visual C++ for Python\\9.0;;C:\\mozilla-build\\moztools\\bin', 'HOMEPATH': '\\Users\\cltbld', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'HG_SHARE_BASE_DIR': '/builds/hg-shared', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'TEMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'GIT_SHARE_BASE_DIR': '/builds/git-shared', 'HOMEDRIVE': 'C:', 'MOZ_AIRBAG': '1', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'BUILDBOT_PATH': 'C:\\mozilla-build\\', 'KTS_HOME': 'C:\\Program Files\\KTS', 'NUMBER_OF_PROCESSORS': '8', 'APPDATA': 'C:\\Users\\cltbld\\AppData\\Roaming', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'c:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'USERPROFILE': 'C:\\Users\\cltbld', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
09:53:08 INFO - Running command: ['c:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'psutil>=3.1.1'] in c:\slave\test\build
09:53:08 INFO - Copy/paste: c:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub psutil>=3.1.1
09:53:08 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
09:53:08 INFO - 'APPDATA': 'C:\\Users\\cltbld\\AppData\\Roaming',
09:53:08 INFO - 'BUILDBOT_PATH': 'C:\\mozilla-build\\',
09:53:08 INFO - 'CHOCOLATEYINSTALL': 'C:\\ProgramData\\chocolatey',
09:53:08 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
09:53:08 INFO - 'COMPUTERNAME': 'T-W732-SPOT-530',
09:53:08 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
09:53:08 INFO - 'DCLOCATION': 'SCL3',
09:53:08 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
09:53:08 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
09:53:08 INFO - 'FP_NO_HOST_CHECK': 'NO',
09:53:08 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
09:53:08 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
09:53:08 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
09:53:08 INFO - 'GIT_SHARE_BASE_DIR': '/builds/git-shared',
09:53:08 INFO - 'HG_SHARE_BASE_DIR': '/builds/hg-shared',
09:53:08 INFO - 'HOMEDRIVE': 'C:',
09:53:08 INFO - 'HOMEPATH': '\\Users\\cltbld',
09:53:08 INFO - 'IDLEIZER_HALT_ON_IDLE': 'true',
09:53:08 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
09:53:08 INFO - 'KTS_VERSION': '1.19c',
09:53:08 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
09:53:08 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld\\AppData\\Local',
09:53:08 INFO - 'LOG': '"c:\\runner\\buildbot-startup.log"',
09:53:08 INFO - 'LOGONSERVER': '\\\\T-W732-SPOT-530',
09:53:08 INFO - 'MAKE_MODE': 'unix',
09:53:08 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build',
09:53:08 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
09:53:08 INFO - 'MOZILLABUILDDRIVE': 'C:',
09:53:08 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
09:53:08 INFO - 'MOZ_AIRBAG': '1',
09:53:08 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
09:53:08 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
09:53:08 INFO - 'MOZ_MSVCVERSION': '8',
09:53:08 INFO - 'MOZ_NO_REMOTE': '1',
09:53:08 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
09:53:08 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
09:53:08 INFO - 'MSYSTEM': 'MINGW32',
09:53:08 INFO - 'NO_EM_RESTART': '1',
09:53:08 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
09:53:08 INFO - 'NUMBER_OF_PROCESSORS': '8',
09:53:08 INFO - 'OS': 'Windows_NT',
09:53:08 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;c:\\Program Files\\Microsoft Windows Performance Toolkit\\;c:\\mozilla-build\\hg\\;C:\\Program Files (x86)\\Microsoft SDKs\\TypeScript\\1.0\\;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\facter\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\hiera\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\ruby\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\tools\\bin;C:\\Program Files (x86)\\Windows Kits\\8.0\\Windows Performance Toolkit\\;C:\\Program Files (x86)\\Windows Kits\\8.1\\Windows Performance Toolkit\\;C:\\Program Files\\Amazon\\cfn-bootstrap\\;C:\\Program Files\\Microsoft SQL Server\\110\\Tools\\Binn\\;C:\\mozilla-build\\buildbotve;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\msys\\local\\bin;C:\\mozilla-build\\msys\\mingw\\bin;C:\\mozilla-build\\python27;C:\\opt\\runner;c:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\Tools\\Binn;C:\\Users\\cltbld\\AppData\\Local\\Programs\\Common\\Microsoft\\Visual C++ for Python\\9.0;;C:\\mozilla-build\\moztools\\bin',
09:53:08 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
09:53:08 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
09:53:08 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 62 Stepping 4, GenuineIntel',
09:53:08 INFO - 'PROCESSOR_LEVEL': '6',
09:53:08 INFO - 'PROCESSOR_REVISION': '3e04',
09:53:08 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
09:53:08 INFO - 'PROGRAMFILES': 'C:\\Program Files',
09:53:08 INFO - 'PROMPT': '$P$G',
09:53:08 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
09:53:08 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\;C:\\Program Files\\AWS Tools\\PowerShell\\',
09:53:08 INFO - 'PUBLIC': 'C:\\Users\\Public',
09:53:08 INFO - 'PWD': 'c:\\slave\\test',
09:53:08 INFO - 'RUNNER_CONFIG_CMD': 'C:\\opt\\runner\\Scripts\\python2.7.exe C:\\opt\\runner\\Scripts\\runner-script.py -c c:\\opt\\runner\\runner.cfg',
09:53:08 INFO - 'SYSTEMDRIVE': 'C:',
09:53:08 INFO - 'SYSTEMROOT': 'C:\\windows',
09:53:08 INFO - 'TEMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp',
09:53:08 INFO - 'TEST1': 'testie',
09:53:08 INFO - 'TMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp',
09:53:08 INFO - 'USERDOMAIN': 'T-W732-SPOT-530',
09:53:08 INFO - 'USERNAME': 'cltbld',
09:53:08 INFO - 'USERPROFILE': 'C:\\Users\\cltbld',
09:53:08 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
09:53:08 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
09:53:08 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
09:53:08 INFO - 'WINDIR': 'C:\\windows',
09:53:08 INFO - 'WINDOWS_TRACING_FLAGS': '3',
09:53:08 INFO - 'WINDOWS_TRACING_LOGFILE': 'C:\\BVTBin\\Tests\\installpackage\\csilogfile.log',
09:53:08 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
09:53:09 INFO - Ignoring indexes: http://pypi.python.org/simple/
09:53:09 INFO - Downloading/unpacking psutil>=3.1.1
09:53:10 INFO - Running setup.py egg_info for package psutil
09:53:10 INFO - warning: no previously-included files matching '*' found under directory 'docs\_build'
09:53:10 INFO - warning: manifest_maker: MANIFEST.in, line 18: 'recursive-include' expects
...
09:53:10 INFO - Installing collected packages: psutil
09:53:10 INFO - Running setup.py install for psutil
09:53:10 INFO - building 'psutil._psutil_windows' extension
09:53:10 INFO - error: Unable to find vcvarsall.bat
09:53:10 INFO - Complete output from command c:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='c:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\users\cltbld\appdata\local\temp\pip-4k5yho-record\install-record.txt --install-headers c:\slave\test\build\venv\include\site\python2.7:
09:53:10 INFO - running install
09:53:10 INFO - running build
09:53:10 INFO - running build_py
09:53:10 INFO - creating build
09:53:10 INFO - creating build\lib.win32-2.7
09:53:10 INFO - creating build\lib.win32-2.7\psutil
09:53:10 INFO - copying psutil\_common.py -> build\lib.win32-2.7\psutil
09:53:10 INFO - copying psutil\_compat.py -> build\lib.win32-2.7\psutil
09:53:10 INFO - copying psutil\_psbsd.py -> build\lib.win32-2.7\psutil
09:53:10 INFO - copying psutil\_pslinux.py -> build\lib.win32-2.7\psutil
09:53:10 INFO - copying psutil\_psosx.py -> build\lib.win32-2.7\psutil
09:53:10 INFO - copying psutil\_psposix.py -> build\lib.win32-2.7\psutil
09:53:10 INFO - copying psutil\_pssunos.py -> build\lib.win32-2.7\psutil
09:53:10 INFO - copying psutil\_pswindows.py -> build\lib.win32-2.7\psutil
09:53:10 INFO - copying psutil\__init__.py -> build\lib.win32-2.7\psutil
09:53:10 INFO - running build_ext
09:53:10 INFO - building 'psutil._psutil_windows' extension
09:53:10 INFO - error: Unable to find vcvarsall.bat
09:53:10 INFO - ----------------------------------------
09:53:10 INFO - Command c:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='c:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\users\cltbld\appdata\local\temp\pip-4k5yho-record\install-record.txt --install-headers c:\slave\test\build\venv\include\site\python2.7 failed with error code 1
09:53:10 INFO - Storing complete log in C:\Users\cltbld\AppData\Roaming\pip\pip.log
09:53:10 WARNING - Return code: 1
09:53:10 WARNING - Could not install python package: c:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub psutil>=3.1.1 failed after 1 tries!
09:53:10 INFO - Installing mozsystemmonitor==0.3 into virtualenv c:\slave\test\build\venv
09:53:10 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:53:10 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
09:53:10 INFO - URL Candidate: http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub
09:53:10 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:53:10 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
09:53:10 INFO - URL Candidate: http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub
09:53:10 INFO - retry: Calling run_command with args: [['c:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'mozsystemmonitor==0.3']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x01CB72C0>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01CDB020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x01DB49F0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0125FDE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01D14180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x01CC6480>, 'level': 'critical'}], 'cwd': 'c:\\slave\\test\\build', 'env': {'TMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-W732-SPOT-530', 'LOG': '"c:\\runner\\buildbot-startup.log"', 'USERDOMAIN': 'T-W732-SPOT-530', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\;C:\\Program Files\\AWS Tools\\PowerShell\\', 'CHOCOLATEYINSTALL': 'C:\\ProgramData\\chocolatey', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 62 Stepping 4, GenuineIntel', 'LOGONSERVER': '\\\\T-W732-SPOT-530', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '3e04', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'NO_EM_RESTART': '1', 'WINDOWS_TRACING_FLAGS': '3', 'MOZ_HIDE_RESULTS_TABLE': '1', 'MAKE_MODE': 'unix', 'XPCOM_DEBUG_BREAK': 'warn', 'WINDOWS_TRACING_LOGFILE': 'C:\\BVTBin\\Tests\\installpackage\\csilogfile.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'MOZILLABUILDDRIVE': 'C:', 'LOCALAPPDATA': 'C:\\Users\\cltbld\\AppData\\Local', 'IDLEIZER_HALT_ON_IDLE': 'true', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MSYSTEM': 'MINGW32', 'MOZBUILDDIR': 'C:\\mozilla-build', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'RUNNER_CONFIG_CMD': 'C:\\opt\\runner\\Scripts\\python2.7.exe C:\\opt\\runner\\Scripts\\runner-script.py -c c:\\opt\\runner\\runner.cfg', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'MSVCDIR': 'D:\\msvs8\\VC', 'PROGRAMDATA': 'C:\\ProgramData', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;c:\\Program Files\\Microsoft Windows Performance Toolkit\\;c:\\mozilla-build\\hg\\;C:\\Program Files (x86)\\Microsoft SDKs\\TypeScript\\1.0\\;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\facter\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\hiera\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\ruby\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\tools\\bin;C:\\Program Files (x86)\\Windows Kits\\8.0\\Windows Performance Toolkit\\;C:\\Program Files (x86)\\Windows Kits\\8.1\\Windows Performance Toolkit\\;C:\\Program Files\\Amazon\\cfn-bootstrap\\;C:\\Program Files\\Microsoft SQL Server\\110\\Tools\\Binn\\;C:\\mozilla-build\\buildbotve;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\msys\\local\\bin;C:\\mozilla-build\\msys\\mingw\\bin;C:\\mozilla-build\\python27;C:\\opt\\runner;c:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\Tools\\Binn;C:\\Users\\cltbld\\AppData\\Local\\Programs\\Common\\Microsoft\\Visual C++ for Python\\9.0;;C:\\mozilla-build\\moztools\\bin', 'HOMEPATH': '\\Users\\cltbld', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'HG_SHARE_BASE_DIR': '/builds/hg-shared', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'TEMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'GIT_SHARE_BASE_DIR': '/builds/git-shared', 'HOMEDRIVE': 'C:', 'MOZ_AIRBAG': '1', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'BUILDBOT_PATH': 'C:\\mozilla-build\\', 'KTS_HOME': 'C:\\Program Files\\KTS', 'NUMBER_OF_PROCESSORS': '8', 'APPDATA': 'C:\\Users\\cltbld\\AppData\\Roaming', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'c:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'USERPROFILE': 'C:\\Users\\cltbld', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
09:53:10 INFO - Running command: ['c:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'mozsystemmonitor==0.3'] in c:\slave\test\build
09:53:10 INFO - Copy/paste: c:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub mozsystemmonitor==0.3
09:53:10 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
09:53:10 INFO - 'APPDATA': 'C:\\Users\\cltbld\\AppData\\Roaming',
09:53:10 INFO - 'BUILDBOT_PATH': 'C:\\mozilla-build\\',
09:53:10 INFO - 'CHOCOLATEYINSTALL': 'C:\\ProgramData\\chocolatey',
09:53:10 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
09:53:10 INFO - 'COMPUTERNAME': 'T-W732-SPOT-530',
09:53:10 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
09:53:10 INFO - 'DCLOCATION': 'SCL3',
09:53:10 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
09:53:10 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
09:53:10 INFO - 'FP_NO_HOST_CHECK': 'NO',
09:53:10 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
09:53:10 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
09:53:10 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
09:53:10 INFO - 'GIT_SHARE_BASE_DIR': '/builds/git-shared',
09:53:10 INFO - 'HG_SHARE_BASE_DIR': '/builds/hg-shared',
09:53:10 INFO - 'HOMEDRIVE': 'C:',
09:53:10 INFO - 'HOMEPATH': '\\Users\\cltbld',
09:53:10 INFO - 'IDLEIZER_HALT_ON_IDLE': 'true',
09:53:10 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
09:53:10 INFO - 'KTS_VERSION': '1.19c',
09:53:10 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
09:53:10 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld\\AppData\\Local',
09:53:10 INFO - 'LOG': '"c:\\runner\\buildbot-startup.log"',
09:53:10 INFO - 'LOGONSERVER': '\\\\T-W732-SPOT-530',
09:53:10 INFO - 'MAKE_MODE': 'unix',
09:53:10 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build',
09:53:10 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
09:53:10 INFO - 'MOZILLABUILDDRIVE': 'C:',
09:53:10 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
09:53:10 INFO - 'MOZ_AIRBAG': '1',
09:53:10 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
09:53:10 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
09:53:10 INFO - 'MOZ_MSVCVERSION': '8',
09:53:10 INFO - 'MOZ_NO_REMOTE': '1',
09:53:10 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
09:53:10 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
09:53:10 INFO - 'MSYSTEM': 'MINGW32',
09:53:10 INFO - 'NO_EM_RESTART': '1',
09:53:10 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
09:53:10 INFO - 'NUMBER_OF_PROCESSORS': '8',
09:53:10 INFO - 'OS': 'Windows_NT',
09:53:10 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;c:\\Program Files\\Microsoft Windows Performance Toolkit\\;c:\\mozilla-build\\hg\\;C:\\Program Files (x86)\\Microsoft SDKs\\TypeScript\\1.0\\;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\facter\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\hiera\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\ruby\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\tools\\bin;C:\\Program Files (x86)\\Windows Kits\\8.0\\Windows Performance Toolkit\\;C:\\Program Files (x86)\\Windows Kits\\8.1\\Windows Performance Toolkit\\;C:\\Program Files\\Amazon\\cfn-bootstrap\\;C:\\Program Files\\Microsoft SQL Server\\110\\Tools\\Binn\\;C:\\mozilla-build\\buildbotve;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\msys\\local\\bin;C:\\mozilla-build\\msys\\mingw\\bin;C:\\mozilla-build\\python27;C:\\opt\\runner;c:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\Tools\\Binn;C:\\Users\\cltbld\\AppData\\Local\\Programs\\Common\\Microsoft\\Visual C++ for Python\\9.0;;C:\\mozilla-build\\moztools\\bin',
09:53:10 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
09:53:10 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
09:53:10 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 62 Stepping 4, GenuineIntel',
09:53:10 INFO - 'PROCESSOR_LEVEL': '6',
09:53:10 INFO - 'PROCESSOR_REVISION': '3e04',
09:53:10 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
09:53:10 INFO - 'PROGRAMFILES': 'C:\\Program Files',
09:53:10 INFO - 'PROMPT': '$P$G',
09:53:10 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
09:53:10 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\;C:\\Program Files\\AWS Tools\\PowerShell\\',
09:53:10 INFO - 'PUBLIC': 'C:\\Users\\Public',
09:53:10 INFO - 'PWD': 'c:\\slave\\test',
09:53:10 INFO - 'RUNNER_CONFIG_CMD': 'C:\\opt\\runner\\Scripts\\python2.7.exe C:\\opt\\runner\\Scripts\\runner-script.py -c c:\\opt\\runner\\runner.cfg',
09:53:10 INFO - 'SYSTEMDRIVE': 'C:',
09:53:10 INFO - 'SYSTEMROOT': 'C:\\windows',
09:53:10 INFO - 'TEMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp',
09:53:10 INFO - 'TEST1': 'testie',
09:53:10 INFO - 'TMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp',
09:53:10 INFO - 'USERDOMAIN': 'T-W732-SPOT-530',
09:53:10 INFO - 'USERNAME': 'cltbld',
09:53:10 INFO - 'USERPROFILE': 'C:\\Users\\cltbld',
09:53:10 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
09:53:10 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
09:53:10 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
09:53:10 INFO - 'WINDIR': 'C:\\windows',
09:53:10 INFO - 'WINDOWS_TRACING_FLAGS': '3',
09:53:10 INFO - 'WINDOWS_TRACING_LOGFILE': 'C:\\BVTBin\\Tests\\installpackage\\csilogfile.log',
09:53:10 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
09:53:11 INFO - Ignoring indexes: http://pypi.python.org/simple/
09:53:11 INFO - Downloading/unpacking mozsystemmonitor==0.3
09:53:11 INFO - Downloading mozsystemmonitor-0.3.tar.gz
09:53:11 INFO - Running setup.py egg_info for package mozsystemmonitor
09:53:11 INFO - Downloading/unpacking psutil>=3.1.1 (from mozsystemmonitor==0.3)
09:53:11 INFO - Running setup.py egg_info for package psutil
09:53:11 INFO - warning: no previously-included files matching '*' found under directory 'docs\_build'
09:53:11 INFO - warning: manifest_maker: MANIFEST.in, line 18: 'recursive-include' expects ...
09:53:11 INFO - Installing collected packages: mozsystemmonitor, psutil
09:53:11 INFO - Running setup.py install for mozsystemmonitor
09:53:11 INFO - Running setup.py install for psutil
09:53:11 INFO - building 'psutil._psutil_windows' extension
09:53:11 INFO - error: Unable to find vcvarsall.bat
09:53:11 INFO - Complete output from command c:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='c:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\users\cltbld\appdata\local\temp\pip-j861mq-record\install-record.txt --install-headers c:\slave\test\build\venv\include\site\python2.7:
09:53:11 INFO - running install
09:53:11 INFO - running build
09:53:11 INFO - running build_py
09:53:11 INFO - running build_ext
09:53:11 INFO - building 'psutil._psutil_windows' extension
09:53:11 INFO - error: Unable to find vcvarsall.bat
09:53:11 INFO - ----------------------------------------
09:53:11 INFO - Command c:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='c:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\users\cltbld\appdata\local\temp\pip-j861mq-record\install-record.txt --install-headers c:\slave\test\build\venv\include\site\python2.7 failed with error code 1
09:53:11 INFO - Storing complete log in C:\Users\cltbld\AppData\Roaming\pip\pip.log
09:53:11 WARNING - Return code: 1
09:53:11 WARNING - Could not install python package: c:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub mozsystemmonitor==0.3 failed after 1 tries!
09:53:11 INFO - Installing jsonschema==2.5.1 into virtualenv c:\slave\test\build\venv
09:53:11 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:53:11 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
09:53:11 INFO - URL Candidate: http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub
09:53:11 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:53:11 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
09:53:11 INFO - URL Candidate: http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub
09:53:11 INFO - retry: Calling run_command with args: [['c:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'jsonschema==2.5.1']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x01CB72C0>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01CDB020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x01DB49F0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0125FDE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01D14180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x01CC6480>, 'level': 'critical'}], 'cwd': 'c:\\slave\\test\\build', 'env': {'TMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-W732-SPOT-530', 'LOG': '"c:\\runner\\buildbot-startup.log"', 'USERDOMAIN': 'T-W732-SPOT-530', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\;C:\\Program Files\\AWS Tools\\PowerShell\\', 'CHOCOLATEYINSTALL': 'C:\\ProgramData\\chocolatey', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 62 Stepping 4, GenuineIntel', 'LOGONSERVER': '\\\\T-W732-SPOT-530', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '3e04', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'NO_EM_RESTART': '1', 'WINDOWS_TRACING_FLAGS': '3', 'MOZ_HIDE_RESULTS_TABLE': '1', 'MAKE_MODE': 'unix', 'XPCOM_DEBUG_BREAK': 'warn', 'WINDOWS_TRACING_LOGFILE': 'C:\\BVTBin\\Tests\\installpackage\\csilogfile.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'MOZILLABUILDDRIVE': 'C:', 'LOCALAPPDATA': 'C:\\Users\\cltbld\\AppData\\Local', 'IDLEIZER_HALT_ON_IDLE': 'true', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MSYSTEM': 'MINGW32', 'MOZBUILDDIR': 'C:\\mozilla-build', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'RUNNER_CONFIG_CMD': 'C:\\opt\\runner\\Scripts\\python2.7.exe C:\\opt\\runner\\Scripts\\runner-script.py -c c:\\opt\\runner\\runner.cfg', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'MSVCDIR': 'D:\\msvs8\\VC', 'PROGRAMDATA': 'C:\\ProgramData', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;c:\\Program Files\\Microsoft Windows Performance Toolkit\\;c:\\mozilla-build\\hg\\;C:\\Program Files (x86)\\Microsoft SDKs\\TypeScript\\1.0\\;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\facter\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\hiera\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\ruby\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\tools\\bin;C:\\Program Files (x86)\\Windows Kits\\8.0\\Windows Performance Toolkit\\;C:\\Program Files (x86)\\Windows Kits\\8.1\\Windows Performance Toolkit\\;C:\\Program Files\\Amazon\\cfn-bootstrap\\;C:\\Program Files\\Microsoft SQL Server\\110\\Tools\\Binn\\;C:\\mozilla-build\\buildbotve;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\msys\\local\\bin;C:\\mozilla-build\\msys\\mingw\\bin;C:\\mozilla-build\\python27;C:\\opt\\runner;c:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\Tools\\Binn;C:\\Users\\cltbld\\AppData\\Local\\Programs\\Common\\Microsoft\\Visual C++ for Python\\9.0;;C:\\mozilla-build\\moztools\\bin', 'HOMEPATH': '\\Users\\cltbld', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'HG_SHARE_BASE_DIR': '/builds/hg-shared', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'TEMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'GIT_SHARE_BASE_DIR': '/builds/git-shared', 'HOMEDRIVE': 'C:', 'MOZ_AIRBAG': '1', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'BUILDBOT_PATH': 'C:\\mozilla-build\\', 'KTS_HOME': 'C:\\Program Files\\KTS', 'NUMBER_OF_PROCESSORS': '8', 'APPDATA': 'C:\\Users\\cltbld\\AppData\\Roaming', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'c:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'USERPROFILE': 'C:\\Users\\cltbld', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
09:53:11 INFO - Running command: ['c:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'jsonschema==2.5.1'] in c:\slave\test\build
09:53:11 INFO - Copy/paste: c:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub jsonschema==2.5.1
09:53:11 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
09:53:11 INFO - 'APPDATA': 'C:\\Users\\cltbld\\AppData\\Roaming',
09:53:11 INFO - 'BUILDBOT_PATH': 'C:\\mozilla-build\\',
09:53:11 INFO - 'CHOCOLATEYINSTALL': 'C:\\ProgramData\\chocolatey',
09:53:11 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
09:53:11 INFO - 'COMPUTERNAME': 'T-W732-SPOT-530',
09:53:11 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
09:53:11 INFO - 'DCLOCATION': 'SCL3',
09:53:11 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
09:53:11 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
09:53:11 INFO - 'FP_NO_HOST_CHECK': 'NO',
09:53:11 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
09:53:11 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
09:53:11 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
09:53:11 INFO - 'GIT_SHARE_BASE_DIR': '/builds/git-shared',
09:53:11 INFO - 'HG_SHARE_BASE_DIR': '/builds/hg-shared',
09:53:11 INFO - 'HOMEDRIVE': 'C:',
09:53:11 INFO - 'HOMEPATH': '\\Users\\cltbld',
09:53:11 INFO - 'IDLEIZER_HALT_ON_IDLE': 'true',
09:53:11 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
09:53:11 INFO - 'KTS_VERSION': '1.19c',
09:53:11 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
09:53:11 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld\\AppData\\Local',
09:53:11 INFO - 'LOG': '"c:\\runner\\buildbot-startup.log"',
09:53:11 INFO - 'LOGONSERVER': '\\\\T-W732-SPOT-530',
09:53:11 INFO - 'MAKE_MODE': 'unix',
09:53:11 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build',
09:53:11 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
09:53:11 INFO - 'MOZILLABUILDDRIVE': 'C:',
09:53:11 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
09:53:11 INFO - 'MOZ_AIRBAG': '1',
09:53:11 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
09:53:11 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
09:53:11 INFO - 'MOZ_MSVCVERSION': '8',
09:53:11 INFO - 'MOZ_NO_REMOTE': '1',
09:53:11 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
09:53:11 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
09:53:11 INFO - 'MSYSTEM': 'MINGW32',
09:53:11 INFO - 'NO_EM_RESTART': '1',
09:53:11 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
09:53:11 INFO - 'NUMBER_OF_PROCESSORS': '8',
09:53:11 INFO - 'OS': 'Windows_NT',
09:53:11 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;c:\\Program Files\\Microsoft Windows Performance Toolkit\\;c:\\mozilla-build\\hg\\;C:\\Program Files (x86)\\Microsoft SDKs\\TypeScript\\1.0\\;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\facter\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\hiera\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\ruby\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\tools\\bin;C:\\Program Files (x86)\\Windows Kits\\8.0\\Windows Performance Toolkit\\;C:\\Program Files (x86)\\Windows Kits\\8.1\\Windows Performance Toolkit\\;C:\\Program Files\\Amazon\\cfn-bootstrap\\;C:\\Program Files\\Microsoft SQL Server\\110\\Tools\\Binn\\;C:\\mozilla-build\\buildbotve;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\msys\\local\\bin;C:\\mozilla-build\\msys\\mingw\\bin;C:\\mozilla-build\\python27;C:\\opt\\runner;c:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\Tools\\Binn;C:\\Users\\cltbld\\AppData\\Local\\Programs\\Common\\Microsoft\\Visual C++ for Python\\9.0;;C:\\mozilla-build\\moztools\\bin',
09:53:11 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
09:53:11 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
09:53:11 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 62 Stepping 4, GenuineIntel',
09:53:11 INFO - 'PROCESSOR_LEVEL': '6',
09:53:11 INFO - 'PROCESSOR_REVISION': '3e04',
09:53:11 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
09:53:11 INFO - 'PROGRAMFILES': 'C:\\Program Files',
09:53:11 INFO - 'PROMPT': '$P$G',
09:53:11 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
09:53:11 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\;C:\\Program Files\\AWS Tools\\PowerShell\\',
09:53:11 INFO - 'PUBLIC': 'C:\\Users\\Public',
09:53:11 INFO - 'PWD': 'c:\\slave\\test',
09:53:11 INFO - 'RUNNER_CONFIG_CMD': 'C:\\opt\\runner\\Scripts\\python2.7.exe C:\\opt\\runner\\Scripts\\runner-script.py -c c:\\opt\\runner\\runner.cfg',
09:53:11 INFO - 'SYSTEMDRIVE': 'C:',
09:53:11 INFO - 'SYSTEMROOT': 'C:\\windows',
09:53:11 INFO - 'TEMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp',
09:53:11 INFO - 'TEST1': 'testie',
09:53:11 INFO - 'TMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp',
09:53:11 INFO - 'USERDOMAIN': 'T-W732-SPOT-530',
09:53:11 INFO - 'USERNAME': 'cltbld',
09:53:11 INFO - 'USERPROFILE': 'C:\\Users\\cltbld',
09:53:11 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
09:53:11 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
09:53:11 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
09:53:11 INFO - 'WINDIR': 'C:\\windows',
09:53:11 INFO - 'WINDOWS_TRACING_FLAGS': '3',
09:53:11 INFO - 'WINDOWS_TRACING_LOGFILE': 'C:\\BVTBin\\Tests\\installpackage\\csilogfile.log',
09:53:11 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
09:53:12 INFO - Ignoring indexes: http://pypi.python.org/simple/
09:53:12 INFO - Downloading/unpacking jsonschema==2.5.1
09:53:15 INFO - Running setup.py egg_info for package jsonschema
09:53:15 INFO - zip_safe flag not set; analyzing archive contents...
09:53:15 INFO - install_dir .
09:53:15 INFO - Installed c:\slave\test\build\venv\build\jsonschema\vcversioner-2.16.0.0-py2.7.egg
09:53:15 INFO - Installing collected packages: jsonschema
09:53:15 INFO - Running setup.py install for jsonschema
09:53:15 INFO - Installing jsonschema-script.py script to c:\slave\test\build\venv\Scripts
09:53:15 INFO - Installing jsonschema.exe script to c:\slave\test\build\venv\Scripts
09:53:15 INFO - Successfully installed jsonschema
09:53:15 INFO - Cleaning up...
09:53:15 INFO - Return code: 0
09:53:15 INFO - Installing functools32==3.2.3-2 into virtualenv c:\slave\test\build\venv
09:53:15 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:53:15 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
09:53:15 INFO - URL Candidate: http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub
09:53:15 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:53:15 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
09:53:15 INFO - URL Candidate: http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub
09:53:15 INFO - retry: Calling run_command with args: [['c:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'functools32==3.2.3-2']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x01CB72C0>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01CDB020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x01DB49F0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0125FDE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01D14180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x01CC6480>, 'level': 'critical'}], 'cwd': 'c:\\slave\\test\\build', 'env': {'TMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-W732-SPOT-530', 'LOG': '"c:\\runner\\buildbot-startup.log"', 'USERDOMAIN': 'T-W732-SPOT-530', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\;C:\\Program Files\\AWS Tools\\PowerShell\\', 'CHOCOLATEYINSTALL': 'C:\\ProgramData\\chocolatey', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 62 Stepping 4, GenuineIntel', 'LOGONSERVER': '\\\\T-W732-SPOT-530', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '3e04', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'NO_EM_RESTART': '1', 'WINDOWS_TRACING_FLAGS': '3', 'MOZ_HIDE_RESULTS_TABLE': '1', 'MAKE_MODE': 'unix', 'XPCOM_DEBUG_BREAK': 'warn', 'WINDOWS_TRACING_LOGFILE': 'C:\\BVTBin\\Tests\\installpackage\\csilogfile.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'MOZILLABUILDDRIVE': 'C:', 'LOCALAPPDATA': 'C:\\Users\\cltbld\\AppData\\Local', 'IDLEIZER_HALT_ON_IDLE': 'true', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MSYSTEM': 'MINGW32', 'MOZBUILDDIR': 'C:\\mozilla-build', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'RUNNER_CONFIG_CMD': 'C:\\opt\\runner\\Scripts\\python2.7.exe C:\\opt\\runner\\Scripts\\runner-script.py -c c:\\opt\\runner\\runner.cfg', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'MSVCDIR': 'D:\\msvs8\\VC', 'PROGRAMDATA': 'C:\\ProgramData', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;c:\\Program Files\\Microsoft Windows Performance Toolkit\\;c:\\mozilla-build\\hg\\;C:\\Program Files (x86)\\Microsoft SDKs\\TypeScript\\1.0\\;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\facter\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\hiera\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\ruby\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\tools\\bin;C:\\Program Files (x86)\\Windows Kits\\8.0\\Windows Performance Toolkit\\;C:\\Program Files (x86)\\Windows Kits\\8.1\\Windows Performance Toolkit\\;C:\\Program Files\\Amazon\\cfn-bootstrap\\;C:\\Program Files\\Microsoft SQL Server\\110\\Tools\\Binn\\;C:\\mozilla-build\\buildbotve;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\msys\\local\\bin;C:\\mozilla-build\\msys\\mingw\\bin;C:\\mozilla-build\\python27;C:\\opt\\runner;c:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\Tools\\Binn;C:\\Users\\cltbld\\AppData\\Local\\Programs\\Common\\Microsoft\\Visual C++ for Python\\9.0;;C:\\mozilla-build\\moztools\\bin', 'HOMEPATH': '\\Users\\cltbld', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'HG_SHARE_BASE_DIR': '/builds/hg-shared', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'TEMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'GIT_SHARE_BASE_DIR': '/builds/git-shared', 'HOMEDRIVE': 'C:', 'MOZ_AIRBAG': '1', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'BUILDBOT_PATH': 'C:\\mozilla-build\\', 'KTS_HOME': 'C:\\Program Files\\KTS', 'NUMBER_OF_PROCESSORS': '8', 'APPDATA': 'C:\\Users\\cltbld\\AppData\\Roaming', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'c:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'USERPROFILE': 'C:\\Users\\cltbld', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
09:53:15 INFO - Running command: ['c:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'functools32==3.2.3-2'] in c:\slave\test\build
09:53:15 INFO - Copy/paste: c:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub functools32==3.2.3-2
09:53:15 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
09:53:15 INFO - 'APPDATA': 'C:\\Users\\cltbld\\AppData\\Roaming',
09:53:15 INFO - 'BUILDBOT_PATH': 'C:\\mozilla-build\\',
09:53:15 INFO - 'CHOCOLATEYINSTALL': 'C:\\ProgramData\\chocolatey',
09:53:15 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
09:53:15 INFO - 'COMPUTERNAME': 'T-W732-SPOT-530',
09:53:15 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
09:53:15 INFO - 'DCLOCATION': 'SCL3',
09:53:15 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
09:53:15 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
09:53:15 INFO - 'FP_NO_HOST_CHECK': 'NO',
09:53:15 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
09:53:15 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
09:53:15 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
09:53:15 INFO - 'GIT_SHARE_BASE_DIR': '/builds/git-shared',
09:53:15 INFO - 'HG_SHARE_BASE_DIR': '/builds/hg-shared',
09:53:15 INFO - 'HOMEDRIVE': 'C:',
09:53:15 INFO - 'HOMEPATH': '\\Users\\cltbld',
09:53:15 INFO - 'IDLEIZER_HALT_ON_IDLE': 'true',
09:53:15 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
09:53:15 INFO - 'KTS_VERSION': '1.19c',
09:53:15 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
09:53:15 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld\\AppData\\Local',
09:53:15 INFO - 'LOG': '"c:\\runner\\buildbot-startup.log"',
09:53:15 INFO - 'LOGONSERVER': '\\\\T-W732-SPOT-530',
09:53:15 INFO - 'MAKE_MODE': 'unix',
09:53:15 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build',
09:53:15 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
09:53:15 INFO - 'MOZILLABUILDDRIVE': 'C:',
09:53:15 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
09:53:15 INFO - 'MOZ_AIRBAG': '1',
09:53:15 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
09:53:15 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
09:53:15 INFO - 'MOZ_MSVCVERSION': '8',
09:53:15 INFO - 'MOZ_NO_REMOTE': '1',
09:53:15 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
09:53:15 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
09:53:15 INFO - 'MSYSTEM': 'MINGW32',
09:53:15 INFO - 'NO_EM_RESTART': '1',
09:53:15 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
09:53:15 INFO - 'NUMBER_OF_PROCESSORS': '8',
09:53:15 INFO - 'OS': 'Windows_NT',
09:53:15 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;c:\\Program Files\\Microsoft Windows Performance Toolkit\\;c:\\mozilla-build\\hg\\;C:\\Program Files (x86)\\Microsoft SDKs\\TypeScript\\1.0\\;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\facter\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\hiera\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\ruby\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\tools\\bin;C:\\Program Files (x86)\\Windows Kits\\8.0\\Windows Performance Toolkit\\;C:\\Program Files (x86)\\Windows Kits\\8.1\\Windows Performance Toolkit\\;C:\\Program Files\\Amazon\\cfn-bootstrap\\;C:\\Program Files\\Microsoft SQL Server\\110\\Tools\\Binn\\;C:\\mozilla-build\\buildbotve;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\msys\\local\\bin;C:\\mozilla-build\\msys\\mingw\\bin;C:\\mozilla-build\\python27;C:\\opt\\runner;c:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\Tools\\Binn;C:\\Users\\cltbld\\AppData\\Local\\Programs\\Common\\Microsoft\\Visual C++ for Python\\9.0;;C:\\mozilla-build\\moztools\\bin',
09:53:15 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
09:53:15 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
09:53:15 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 62 Stepping 4, GenuineIntel',
09:53:15 INFO - 'PROCESSOR_LEVEL': '6',
09:53:15 INFO - 'PROCESSOR_REVISION': '3e04',
09:53:15 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
09:53:15 INFO - 'PROGRAMFILES': 'C:\\Program Files',
09:53:15 INFO - 'PROMPT': '$P$G',
09:53:15 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
09:53:15 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\;C:\\Program Files\\AWS Tools\\PowerShell\\',
09:53:15 INFO - 'PUBLIC': 'C:\\Users\\Public',
09:53:15 INFO - 'PWD': 'c:\\slave\\test',
09:53:15 INFO - 'RUNNER_CONFIG_CMD': 'C:\\opt\\runner\\Scripts\\python2.7.exe C:\\opt\\runner\\Scripts\\runner-script.py -c c:\\opt\\runner\\runner.cfg',
09:53:15 INFO - 'SYSTEMDRIVE': 'C:',
09:53:15 INFO - 'SYSTEMROOT': 'C:\\windows',
09:53:15 INFO - 'TEMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp',
09:53:15 INFO - 'TEST1': 'testie',
09:53:15 INFO - 'TMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp',
09:53:15 INFO - 'USERDOMAIN': 'T-W732-SPOT-530',
09:53:15 INFO - 'USERNAME': 'cltbld',
09:53:15 INFO - 'USERPROFILE': 'C:\\Users\\cltbld',
09:53:15 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
09:53:15 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
09:53:15 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
09:53:15 INFO - 'WINDIR': 'C:\\windows',
09:53:15 INFO - 'WINDOWS_TRACING_FLAGS': '3',
09:53:15 INFO - 'WINDOWS_TRACING_LOGFILE': 'C:\\BVTBin\\Tests\\installpackage\\csilogfile.log',
09:53:15 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
09:53:16 INFO - Ignoring indexes: http://pypi.python.org/simple/
09:53:16 INFO - Downloading/unpacking functools32==3.2.3-2
09:53:16 INFO - Downloading functools32-3.2.3-2.tar.gz
09:53:16 INFO - Running setup.py egg_info for package functools32
09:53:16 INFO - warning: no files found matching '*.txt'
09:53:16 INFO - no previously-included directories found matching 'build'
09:53:16 INFO - no previously-included directories found matching 'dist'
09:53:16 INFO - no previously-included directories found matching '.git*'
09:53:16 INFO - Installing collected packages: functools32
09:53:16 INFO - Running setup.py install for functools32
09:53:16 INFO - warning: no files found matching '*.txt'
09:53:16 INFO - no previously-included directories found matching 'build'
09:53:16 INFO - no previously-included directories found matching 'dist'
09:53:16 INFO - no previously-included directories found matching '.git*'
09:53:16 INFO - Successfully installed functools32
09:53:16 INFO - Cleaning up...
09:53:16 INFO - Return code: 0
09:53:16 INFO - Installing blobuploader==1.2.4 into virtualenv c:\slave\test\build\venv
09:53:16 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:53:16 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
09:53:16 INFO - URL Candidate: http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub
09:53:16 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:53:16 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
09:53:16 INFO - URL Candidate: http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub
09:53:16 INFO - retry: Calling run_command with args: [['c:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'blobuploader==1.2.4']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x01CB72C0>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01CDB020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x01DB49F0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0125FDE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01D14180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x01CC6480>, 'level': 'critical'}], 'cwd': 'c:\\slave\\test\\build', 'env': {'TMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-W732-SPOT-530', 'LOG': '"c:\\runner\\buildbot-startup.log"', 'USERDOMAIN': 'T-W732-SPOT-530', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\;C:\\Program Files\\AWS Tools\\PowerShell\\', 'CHOCOLATEYINSTALL': 'C:\\ProgramData\\chocolatey', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 62 Stepping 4, GenuineIntel', 'LOGONSERVER': '\\\\T-W732-SPOT-530', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '3e04', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'NO_EM_RESTART': '1', 'WINDOWS_TRACING_FLAGS': '3', 'MOZ_HIDE_RESULTS_TABLE': '1', 'MAKE_MODE': 'unix', 'XPCOM_DEBUG_BREAK': 'warn', 'WINDOWS_TRACING_LOGFILE': 'C:\\BVTBin\\Tests\\installpackage\\csilogfile.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'MOZILLABUILDDRIVE': 'C:', 'LOCALAPPDATA': 'C:\\Users\\cltbld\\AppData\\Local', 'IDLEIZER_HALT_ON_IDLE': 'true', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MSYSTEM': 'MINGW32', 'MOZBUILDDIR': 'C:\\mozilla-build', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'RUNNER_CONFIG_CMD': 'C:\\opt\\runner\\Scripts\\python2.7.exe C:\\opt\\runner\\Scripts\\runner-script.py -c c:\\opt\\runner\\runner.cfg', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'MSVCDIR': 'D:\\msvs8\\VC', 'PROGRAMDATA': 'C:\\ProgramData', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;c:\\Program Files\\Microsoft Windows Performance Toolkit\\;c:\\mozilla-build\\hg\\;C:\\Program Files (x86)\\Microsoft SDKs\\TypeScript\\1.0\\;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\facter\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\hiera\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\ruby\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\tools\\bin;C:\\Program Files (x86)\\Windows Kits\\8.0\\Windows Performance Toolkit\\;C:\\Program Files (x86)\\Windows Kits\\8.1\\Windows Performance Toolkit\\;C:\\Program Files\\Amazon\\cfn-bootstrap\\;C:\\Program Files\\Microsoft SQL Server\\110\\Tools\\Binn\\;C:\\mozilla-build\\buildbotve;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\msys\\local\\bin;C:\\mozilla-build\\msys\\mingw\\bin;C:\\mozilla-build\\python27;C:\\opt\\runner;c:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\Tools\\Binn;C:\\Users\\cltbld\\AppData\\Local\\Programs\\Common\\Microsoft\\Visual C++ for Python\\9.0;;C:\\mozilla-build\\moztools\\bin', 'HOMEPATH': '\\Users\\cltbld', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'HG_SHARE_BASE_DIR': '/builds/hg-shared', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'TEMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'GIT_SHARE_BASE_DIR': '/builds/git-shared', 'HOMEDRIVE': 'C:', 'MOZ_AIRBAG': '1', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'BUILDBOT_PATH': 'C:\\mozilla-build\\', 'KTS_HOME': 'C:\\Program Files\\KTS', 'NUMBER_OF_PROCESSORS': '8', 'APPDATA': 'C:\\Users\\cltbld\\AppData\\Roaming', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'c:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'USERPROFILE': 'C:\\Users\\cltbld', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
09:53:16 INFO - Running command: ['c:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'blobuploader==1.2.4'] in c:\slave\test\build
09:53:16 INFO - Copy/paste: c:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub blobuploader==1.2.4
09:53:16 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
09:53:16 INFO - 'APPDATA': 'C:\\Users\\cltbld\\AppData\\Roaming',
09:53:16 INFO - 'BUILDBOT_PATH': 'C:\\mozilla-build\\',
09:53:16 INFO - 'CHOCOLATEYINSTALL': 'C:\\ProgramData\\chocolatey',
09:53:16 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
09:53:16 INFO - 'COMPUTERNAME': 'T-W732-SPOT-530',
09:53:16 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
09:53:16 INFO - 'DCLOCATION': 'SCL3',
09:53:16 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
09:53:16 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
09:53:16 INFO - 'FP_NO_HOST_CHECK': 'NO',
09:53:16 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
09:53:16 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
09:53:16 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
09:53:16 INFO - 'GIT_SHARE_BASE_DIR': '/builds/git-shared',
09:53:16 INFO - 'HG_SHARE_BASE_DIR': '/builds/hg-shared',
09:53:16 INFO - 'HOMEDRIVE': 'C:',
09:53:16 INFO - 'HOMEPATH': '\\Users\\cltbld',
09:53:16 INFO - 'IDLEIZER_HALT_ON_IDLE': 'true',
09:53:16 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
09:53:16 INFO - 'KTS_VERSION': '1.19c',
09:53:16 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
09:53:16 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld\\AppData\\Local',
09:53:16 INFO - 'LOG': '"c:\\runner\\buildbot-startup.log"',
09:53:16 INFO - 'LOGONSERVER': '\\\\T-W732-SPOT-530',
09:53:16 INFO - 'MAKE_MODE': 'unix',
09:53:16 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build',
09:53:16 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
09:53:16 INFO - 'MOZILLABUILDDRIVE': 'C:',
09:53:16 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
09:53:16 INFO - 'MOZ_AIRBAG': '1',
09:53:16 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
09:53:16 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
09:53:16 INFO - 'MOZ_MSVCVERSION': '8',
09:53:16 INFO - 'MOZ_NO_REMOTE': '1',
09:53:16 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
09:53:16 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
09:53:16 INFO - 'MSYSTEM': 'MINGW32',
09:53:16 INFO - 'NO_EM_RESTART': '1',
09:53:16 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
09:53:16 INFO - 'NUMBER_OF_PROCESSORS': '8',
09:53:16 INFO - 'OS': 'Windows_NT',
09:53:16 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;c:\\Program Files\\Microsoft Windows Performance Toolkit\\;c:\\mozilla-build\\hg\\;C:\\Program Files (x86)\\Microsoft SDKs\\TypeScript\\1.0\\;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\facter\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\hiera\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\ruby\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\tools\\bin;C:\\Program Files (x86)\\Windows Kits\\8.0\\Windows Performance Toolkit\\;C:\\Program Files (x86)\\Windows Kits\\8.1\\Windows Performance Toolkit\\;C:\\Program Files\\Amazon\\cfn-bootstrap\\;C:\\Program Files\\Microsoft SQL Server\\110\\Tools\\Binn\\;C:\\mozilla-build\\buildbotve;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\msys\\local\\bin;C:\\mozilla-build\\msys\\mingw\\bin;C:\\mozilla-build\\python27;C:\\opt\\runner;c:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\Tools\\Binn;C:\\Users\\cltbld\\AppData\\Local\\Programs\\Common\\Microsoft\\Visual C++ for Python\\9.0;;C:\\mozilla-build\\moztools\\bin',
09:53:16 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
09:53:16 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
09:53:16 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 62 Stepping 4, GenuineIntel',
09:53:16 INFO - 'PROCESSOR_LEVEL': '6',
09:53:16 INFO - 'PROCESSOR_REVISION': '3e04',
09:53:16 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
09:53:16 INFO - 'PROGRAMFILES': 'C:\\Program Files',
09:53:16 INFO - 'PROMPT': '$P$G',
09:53:16 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
09:53:16 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\;C:\\Program Files\\AWS Tools\\PowerShell\\',
09:53:16 INFO - 'PUBLIC': 'C:\\Users\\Public',
09:53:16 INFO - 'PWD': 'c:\\slave\\test',
09:53:16 INFO - 'RUNNER_CONFIG_CMD': 'C:\\opt\\runner\\Scripts\\python2.7.exe C:\\opt\\runner\\Scripts\\runner-script.py -c c:\\opt\\runner\\runner.cfg',
09:53:16 INFO - 'SYSTEMDRIVE': 'C:',
09:53:16 INFO - 'SYSTEMROOT': 'C:\\windows',
09:53:16 INFO - 'TEMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp',
09:53:16 INFO - 'TEST1': 'testie',
09:53:16 INFO - 'TMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp',
09:53:16 INFO - 'USERDOMAIN': 'T-W732-SPOT-530',
09:53:16 INFO - 'USERNAME': 'cltbld',
09:53:16 INFO - 'USERPROFILE': 'C:\\Users\\cltbld',
09:53:16 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
09:53:16 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
09:53:16 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
09:53:16 INFO - 'WINDIR': 'C:\\windows',
09:53:16 INFO - 'WINDOWS_TRACING_FLAGS': '3',
09:53:16 INFO - 'WINDOWS_TRACING_LOGFILE': 'C:\\BVTBin\\Tests\\installpackage\\csilogfile.log',
09:53:16 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
09:53:18 INFO - Ignoring indexes: http://pypi.python.org/simple/
09:53:18 INFO - Downloading/unpacking blobuploader==1.2.4
09:53:18 INFO - Downloading blobuploader-1.2.4.tar.gz
09:53:18 INFO - Running setup.py egg_info for package blobuploader
09:53:18 INFO - Downloading/unpacking requests==1.2.3. (from blobuploader==1.2.4)
09:53:21 INFO - Running setup.py egg_info for package requests
09:53:21 INFO - Downloading/unpacking docopt==0.6.1 (from blobuploader==1.2.4)
09:53:21 INFO - Downloading docopt-0.6.1.tar.gz
09:53:21 INFO - Running setup.py egg_info for package docopt
09:53:21 INFO - Installing collected packages: blobuploader, docopt, requests
09:53:21 INFO - Running setup.py install for blobuploader
09:53:21 INFO - Running setup.py install for docopt
09:53:21 INFO - Running setup.py install for requests
09:53:21 INFO - Successfully installed blobuploader docopt requests
09:53:21 INFO - Cleaning up...
09:53:21 INFO - Return code: 0
09:53:21 INFO - Installing None into virtualenv c:\slave\test\build\venv
09:53:21 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:53:21 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
09:53:21 INFO - URL Candidate: http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub
09:53:21 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:53:21 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
09:53:21 INFO - URL Candidate: http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub
09:53:21 INFO - retry: Calling run_command with args: [['c:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--no-deps', '--timeout', '120', '-r', 'c:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x01CB72C0>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01CDB020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x01DB49F0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0125FDE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01D14180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x01CC6480>, 'level': 'critical'}], 'cwd': 'c:\\slave\\test\\build\\tests\\config', 'env': {'TMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-W732-SPOT-530', 'LOG': '"c:\\runner\\buildbot-startup.log"', 'USERDOMAIN': 'T-W732-SPOT-530', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\;C:\\Program Files\\AWS Tools\\PowerShell\\', 'CHOCOLATEYINSTALL': 'C:\\ProgramData\\chocolatey', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 62 Stepping 4, GenuineIntel', 'LOGONSERVER': '\\\\T-W732-SPOT-530', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '3e04', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'NO_EM_RESTART': '1', 'WINDOWS_TRACING_FLAGS': '3', 'MOZ_HIDE_RESULTS_TABLE': '1', 'MAKE_MODE': 'unix', 'XPCOM_DEBUG_BREAK': 'warn', 'WINDOWS_TRACING_LOGFILE': 'C:\\BVTBin\\Tests\\installpackage\\csilogfile.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'MOZILLABUILDDRIVE': 'C:', 'LOCALAPPDATA': 'C:\\Users\\cltbld\\AppData\\Local', 'IDLEIZER_HALT_ON_IDLE': 'true', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MSYSTEM': 'MINGW32', 'MOZBUILDDIR': 'C:\\mozilla-build', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'RUNNER_CONFIG_CMD': 'C:\\opt\\runner\\Scripts\\python2.7.exe C:\\opt\\runner\\Scripts\\runner-script.py -c c:\\opt\\runner\\runner.cfg', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'MSVCDIR': 'D:\\msvs8\\VC', 'PROGRAMDATA': 'C:\\ProgramData', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;c:\\Program Files\\Microsoft Windows Performance Toolkit\\;c:\\mozilla-build\\hg\\;C:\\Program Files (x86)\\Microsoft SDKs\\TypeScript\\1.0\\;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\facter\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\hiera\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\ruby\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\tools\\bin;C:\\Program Files (x86)\\Windows Kits\\8.0\\Windows Performance Toolkit\\;C:\\Program Files (x86)\\Windows Kits\\8.1\\Windows Performance Toolkit\\;C:\\Program Files\\Amazon\\cfn-bootstrap\\;C:\\Program Files\\Microsoft SQL Server\\110\\Tools\\Binn\\;C:\\mozilla-build\\buildbotve;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\msys\\local\\bin;C:\\mozilla-build\\msys\\mingw\\bin;C:\\mozilla-build\\python27;C:\\opt\\runner;c:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\Tools\\Binn;C:\\Users\\cltbld\\AppData\\Local\\Programs\\Common\\Microsoft\\Visual C++ for Python\\9.0;;C:\\mozilla-build\\moztools\\bin', 'HOMEPATH': '\\Users\\cltbld', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'HG_SHARE_BASE_DIR': '/builds/hg-shared', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'TEMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'GIT_SHARE_BASE_DIR': '/builds/git-shared', 'HOMEDRIVE': 'C:', 'MOZ_AIRBAG': '1', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'BUILDBOT_PATH': 'C:\\mozilla-build\\', 'KTS_HOME': 'C:\\Program Files\\KTS', 'NUMBER_OF_PROCESSORS': '8', 'APPDATA': 'C:\\Users\\cltbld\\AppData\\Roaming', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'c:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'USERPROFILE': 'C:\\Users\\cltbld', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
09:53:21 INFO - Running command: ['c:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--no-deps', '--timeout', '120', '-r', 'c:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub'] in c:\slave\test\build\tests\config
09:53:21 INFO - Copy/paste: c:\slave\test\build\venv\Scripts\pip install --no-deps --timeout 120 -r c:\slave\test\build\tests\config\marionette_requirements.txt --no-index --find-links http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub
09:53:21 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
09:53:21 INFO - 'APPDATA': 'C:\\Users\\cltbld\\AppData\\Roaming',
09:53:21 INFO - 'BUILDBOT_PATH': 'C:\\mozilla-build\\',
09:53:21 INFO - 'CHOCOLATEYINSTALL': 'C:\\ProgramData\\chocolatey',
09:53:21 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
09:53:21 INFO - 'COMPUTERNAME': 'T-W732-SPOT-530',
09:53:21 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
09:53:21 INFO - 'DCLOCATION': 'SCL3',
09:53:21 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
09:53:21 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
09:53:21 INFO - 'FP_NO_HOST_CHECK': 'NO',
09:53:21 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
09:53:21 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
09:53:21 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
09:53:21 INFO - 'GIT_SHARE_BASE_DIR': '/builds/git-shared',
09:53:21 INFO - 'HG_SHARE_BASE_DIR': '/builds/hg-shared',
09:53:21 INFO - 'HOMEDRIVE': 'C:',
09:53:21 INFO - 'HOMEPATH': '\\Users\\cltbld',
09:53:21 INFO - 'IDLEIZER_HALT_ON_IDLE': 'true',
09:53:21 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
09:53:21 INFO - 'KTS_VERSION': '1.19c',
09:53:21 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
09:53:21 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld\\AppData\\Local',
09:53:21 INFO - 'LOG': '"c:\\runner\\buildbot-startup.log"',
09:53:21 INFO - 'LOGONSERVER': '\\\\T-W732-SPOT-530',
09:53:21 INFO - 'MAKE_MODE': 'unix',
09:53:21 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build',
09:53:21 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
09:53:21 INFO - 'MOZILLABUILDDRIVE': 'C:',
09:53:21 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
09:53:21 INFO - 'MOZ_AIRBAG': '1',
09:53:21 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
09:53:21 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
09:53:21 INFO - 'MOZ_MSVCVERSION': '8',
09:53:21 INFO - 'MOZ_NO_REMOTE': '1',
09:53:21 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
09:53:21 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
09:53:21 INFO - 'MSYSTEM': 'MINGW32',
09:53:21 INFO - 'NO_EM_RESTART': '1',
09:53:21 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
09:53:21 INFO - 'NUMBER_OF_PROCESSORS': '8',
09:53:21 INFO - 'OS': 'Windows_NT',
09:53:21 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;c:\\Program Files\\Microsoft Windows Performance Toolkit\\;c:\\mozilla-build\\hg\\;C:\\Program Files (x86)\\Microsoft SDKs\\TypeScript\\1.0\\;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\facter\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\hiera\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\ruby\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\tools\\bin;C:\\Program Files (x86)\\Windows Kits\\8.0\\Windows Performance Toolkit\\;C:\\Program Files (x86)\\Windows Kits\\8.1\\Windows Performance Toolkit\\;C:\\Program Files\\Amazon\\cfn-bootstrap\\;C:\\Program Files\\Microsoft SQL Server\\110\\Tools\\Binn\\;C:\\mozilla-build\\buildbotve;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\msys\\local\\bin;C:\\mozilla-build\\msys\\mingw\\bin;C:\\mozilla-build\\python27;C:\\opt\\runner;c:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\Tools\\Binn;C:\\Users\\cltbld\\AppData\\Local\\Programs\\Common\\Microsoft\\Visual C++ for Python\\9.0;;C:\\mozilla-build\\moztools\\bin',
09:53:21 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
09:53:21 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
09:53:21 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 62 Stepping 4, GenuineIntel',
09:53:21 INFO - 'PROCESSOR_LEVEL': '6',
09:53:21 INFO - 'PROCESSOR_REVISION': '3e04',
09:53:21 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
09:53:21 INFO - 'PROGRAMFILES': 'C:\\Program Files',
09:53:21 INFO - 'PROMPT': '$P$G',
09:53:21 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
09:53:21 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\;C:\\Program Files\\AWS Tools\\PowerShell\\',
09:53:21 INFO - 'PUBLIC': 'C:\\Users\\Public',
09:53:21 INFO - 'PWD': 'c:\\slave\\test',
09:53:21 INFO - 'RUNNER_CONFIG_CMD': 'C:\\opt\\runner\\Scripts\\python2.7.exe C:\\opt\\runner\\Scripts\\runner-script.py -c c:\\opt\\runner\\runner.cfg',
09:53:21 INFO - 'SYSTEMDRIVE': 'C:',
09:53:21 INFO - 'SYSTEMROOT': 'C:\\windows',
09:53:21 INFO - 'TEMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp',
09:53:21 INFO - 'TEST1': 'testie',
09:53:21 INFO - 'TMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp',
09:53:21 INFO - 'USERDOMAIN': 'T-W732-SPOT-530',
09:53:21 INFO - 'USERNAME': 'cltbld',
09:53:21 INFO - 'USERPROFILE': 'C:\\Users\\cltbld',
09:53:21 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
09:53:21 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
09:53:21 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
09:53:21 INFO - 'WINDIR': 'C:\\windows',
09:53:21 INFO - 'WINDOWS_TRACING_FLAGS': '3',
09:53:21 INFO - 'WINDOWS_TRACING_LOGFILE': 'C:\\BVTBin\\Tests\\installpackage\\csilogfile.log',
09:53:21 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
09:53:25 INFO - Ignoring indexes: http://pypi.python.org/simple/
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\manifestparser
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmanifestparser
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozcrash
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozcrash
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdebug
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdebug
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdevice
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdevice
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozfile
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozfile
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozhttpd
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozhttpd
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinfo
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinfo
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinstall
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinstall
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozleak
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozleak
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozlog
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozlog
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\moznetwork
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoznetwork
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprocess
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprocess
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprofile
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprofile
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozrunner
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozrunner
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozscreenshot
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozscreenshot
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\moztest
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoztest
09:53:25 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozversion
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozversion
09:53:25 INFO - Unpacking c:\slave\test\build\tests\tools\wptserve
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Ctools%5Cwptserve
09:53:25 INFO - Unpacking c:\slave\test\build\tests\marionette\client
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cclient
09:53:25 INFO - Unpacking c:\slave\test\build\tests\marionette\marionette\runner\mixins\browsermob-proxy-py
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cmarionette%5Crunner%5Cmixins%5Cbrowsermob-proxy-py
09:53:25 INFO - Unpacking c:\slave\test\build\tests\marionette
09:53:25 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette
09:53:25 INFO - warning: no files found matching '*.js' under directory 'marionette\touch'
09:53:25 INFO - Installing collected packages: browsermob-proxy, manifestparser, marionette-client, marionette-driver, mozcrash, mozdebug, mozdevice, mozfile, mozhttpd, mozinfo, mozInstall, mozleak, mozlog, moznetwork, mozprocess, mozprofile, mozrunner, mozscreenshot, moztest, mozversion, wptserve
09:53:25 INFO - Running setup.py install for browsermob-proxy
09:53:37 INFO - Running setup.py install for manifestparser
09:53:37 INFO - Installing manifestparser-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing manifestparser.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Running setup.py install for marionette-client
09:53:37 INFO - warning: no files found matching '*.js' under directory 'marionette\touch'
09:53:37 INFO - Installing marionette-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing marionette.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Running setup.py install for marionette-driver
09:53:37 INFO - Running setup.py install for mozcrash
09:53:37 INFO - Running setup.py install for mozdebug
09:53:37 INFO - Running setup.py install for mozdevice
09:53:37 INFO - Installing sutini-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing sutini.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing dm-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing dm.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Running setup.py install for mozfile
09:53:37 INFO - Running setup.py install for mozhttpd
09:53:37 INFO - Installing mozhttpd-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing mozhttpd.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Running setup.py install for mozinfo
09:53:37 INFO - Installing mozinfo-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing mozinfo.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Running setup.py install for mozInstall
09:53:37 INFO - Installing moz_remove_from_system-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing moz_remove_from_system.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing mozuninstall-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing mozuninstall.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing mozinstall-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing mozinstall.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing moz_add_to_system-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing moz_add_to_system.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Running setup.py install for mozleak
09:53:37 INFO - Running setup.py install for mozlog
09:53:37 INFO - Installing structlog-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing structlog.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Running setup.py install for moznetwork
09:53:37 INFO - Installing moznetwork-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing moznetwork.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Running setup.py install for mozprocess
09:53:37 INFO - Running setup.py install for mozprofile
09:53:37 INFO - Installing mozprofile-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing mozprofile.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing diff-profiles-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing diff-profiles.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing view-profile-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing view-profile.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Running setup.py install for mozrunner
09:53:37 INFO - Installing mozrunner-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing mozrunner.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Running setup.py install for mozscreenshot
09:53:37 INFO - Running setup.py install for moztest
09:53:37 INFO - Running setup.py install for mozversion
09:53:37 INFO - Installing mozversion-script.py script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Installing mozversion.exe script to c:\slave\test\build\venv\Scripts
09:53:37 INFO - Running setup.py install for wptserve
09:53:37 INFO - Successfully installed browsermob-proxy manifestparser marionette-client marionette-driver mozcrash mozdebug mozdevice mozfile mozhttpd mozinfo mozInstall mozleak mozlog moznetwork mozprocess mozprofile mozrunner mozscreenshot moztest mozversion wptserve
09:53:37 INFO - Cleaning up...
09:53:37 INFO - Return code: 0
09:53:37 INFO - Installing None into virtualenv c:\slave\test\build\venv
09:53:37 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:53:37 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
09:53:37 INFO - URL Candidate: http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub
09:53:37 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:53:37 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
09:53:37 INFO - URL Candidate: http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub
09:53:37 INFO - retry: Calling run_command with args: [['c:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '-r', 'c:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x01CB72C0>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01CDB020>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x01DB49F0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0125FDE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01D14180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x01CC6480>, 'level': 'critical'}], 'cwd': 'c:\\slave\\test\\build\\tests\\config', 'env': {'TMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-W732-SPOT-530', 'LOG': '"c:\\runner\\buildbot-startup.log"', 'USERDOMAIN': 'T-W732-SPOT-530', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\;C:\\Program Files\\AWS Tools\\PowerShell\\', 'CHOCOLATEYINSTALL': 'C:\\ProgramData\\chocolatey', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 62 Stepping 4, GenuineIntel', 'LOGONSERVER': '\\\\T-W732-SPOT-530', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '3e04', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'NO_EM_RESTART': '1', 'WINDOWS_TRACING_FLAGS': '3', 'MOZ_HIDE_RESULTS_TABLE': '1', 'MAKE_MODE': 'unix', 'XPCOM_DEBUG_BREAK': 'warn', 'WINDOWS_TRACING_LOGFILE': 'C:\\BVTBin\\Tests\\installpackage\\csilogfile.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'MOZILLABUILDDRIVE': 'C:', 'LOCALAPPDATA': 'C:\\Users\\cltbld\\AppData\\Local', 'IDLEIZER_HALT_ON_IDLE': 'true', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MSYSTEM': 'MINGW32', 'MOZBUILDDIR': 'C:\\mozilla-build', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'RUNNER_CONFIG_CMD': 'C:\\opt\\runner\\Scripts\\python2.7.exe C:\\opt\\runner\\Scripts\\runner-script.py -c c:\\opt\\runner\\runner.cfg', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'MSVCDIR': 'D:\\msvs8\\VC', 'PROGRAMDATA': 'C:\\ProgramData', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;c:\\Program Files\\Microsoft Windows Performance Toolkit\\;c:\\mozilla-build\\hg\\;C:\\Program Files (x86)\\Microsoft SDKs\\TypeScript\\1.0\\;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\facter\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\hiera\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\ruby\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\tools\\bin;C:\\Program Files (x86)\\Windows Kits\\8.0\\Windows Performance Toolkit\\;C:\\Program Files (x86)\\Windows Kits\\8.1\\Windows Performance Toolkit\\;C:\\Program Files\\Amazon\\cfn-bootstrap\\;C:\\Program Files\\Microsoft SQL Server\\110\\Tools\\Binn\\;C:\\mozilla-build\\buildbotve;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\msys\\local\\bin;C:\\mozilla-build\\msys\\mingw\\bin;C:\\mozilla-build\\python27;C:\\opt\\runner;c:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\Tools\\Binn;C:\\Users\\cltbld\\AppData\\Local\\Programs\\Common\\Microsoft\\Visual C++ for Python\\9.0;;C:\\mozilla-build\\moztools\\bin', 'HOMEPATH': '\\Users\\cltbld', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'HG_SHARE_BASE_DIR': '/builds/hg-shared', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'TEMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'GIT_SHARE_BASE_DIR': '/builds/git-shared', 'HOMEDRIVE': 'C:', 'MOZ_AIRBAG': '1', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'BUILDBOT_PATH': 'C:\\mozilla-build\\', 'KTS_HOME': 'C:\\Program Files\\KTS', 'NUMBER_OF_PROCESSORS': '8', 'APPDATA': 'C:\\Users\\cltbld\\AppData\\Roaming', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'c:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'USERPROFILE': 'C:\\Users\\cltbld', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
09:53:37 INFO - Running command: ['c:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '-r', 'c:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub'] in c:\slave\test\build\tests\config
09:53:37 INFO - Copy/paste: c:\slave\test\build\venv\Scripts\pip install --timeout 120 -r c:\slave\test\build\tests\config\marionette_requirements.txt --no-index --find-links http://pypi.pvt.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pub.build.mozilla.org.proxxy1.srv.releng.usw2.mozilla.com/pub --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub
09:53:37 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
09:53:37 INFO - 'APPDATA': 'C:\\Users\\cltbld\\AppData\\Roaming',
09:53:37 INFO - 'BUILDBOT_PATH': 'C:\\mozilla-build\\',
09:53:37 INFO - 'CHOCOLATEYINSTALL': 'C:\\ProgramData\\chocolatey',
09:53:37 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
09:53:37 INFO - 'COMPUTERNAME': 'T-W732-SPOT-530',
09:53:37 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
09:53:37 INFO - 'DCLOCATION': 'SCL3',
09:53:37 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
09:53:37 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
09:53:37 INFO - 'FP_NO_HOST_CHECK': 'NO',
09:53:37 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
09:53:37 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
09:53:37 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
09:53:37 INFO - 'GIT_SHARE_BASE_DIR': '/builds/git-shared',
09:53:37 INFO - 'HG_SHARE_BASE_DIR': '/builds/hg-shared',
09:53:37 INFO - 'HOMEDRIVE': 'C:',
09:53:37 INFO - 'HOMEPATH': '\\Users\\cltbld',
09:53:37 INFO - 'IDLEIZER_HALT_ON_IDLE': 'true',
09:53:37 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
09:53:37 INFO - 'KTS_VERSION': '1.19c',
09:53:37 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
09:53:37 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld\\AppData\\Local',
09:53:37 INFO - 'LOG': '"c:\\runner\\buildbot-startup.log"',
09:53:37 INFO - 'LOGONSERVER': '\\\\T-W732-SPOT-530',
09:53:37 INFO - 'MAKE_MODE': 'unix',
09:53:37 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build',
09:53:37 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
09:53:37 INFO - 'MOZILLABUILDDRIVE': 'C:',
09:53:37 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
09:53:37 INFO - 'MOZ_AIRBAG': '1',
09:53:37 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
09:53:37 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
09:53:37 INFO - 'MOZ_MSVCVERSION': '8',
09:53:37 INFO - 'MOZ_NO_REMOTE': '1',
09:53:37 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
09:53:37 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
09:53:37 INFO - 'MSYSTEM': 'MINGW32',
09:53:37 INFO - 'NO_EM_RESTART': '1',
09:53:37 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
09:53:37 INFO - 'NUMBER_OF_PROCESSORS': '8',
09:53:37 INFO - 'OS': 'Windows_NT',
09:53:37 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;c:\\Program Files\\Microsoft Windows Performance Toolkit\\;c:\\mozilla-build\\hg\\;C:\\Program Files (x86)\\Microsoft SDKs\\TypeScript\\1.0\\;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\facter\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\hiera\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\ruby\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\tools\\bin;C:\\Program Files (x86)\\Windows Kits\\8.0\\Windows Performance Toolkit\\;C:\\Program Files (x86)\\Windows Kits\\8.1\\Windows Performance Toolkit\\;C:\\Program Files\\Amazon\\cfn-bootstrap\\;C:\\Program Files\\Microsoft SQL Server\\110\\Tools\\Binn\\;C:\\mozilla-build\\buildbotve;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\msys\\local\\bin;C:\\mozilla-build\\msys\\mingw\\bin;C:\\mozilla-build\\python27;C:\\opt\\runner;c:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\Tools\\Binn;C:\\Users\\cltbld\\AppData\\Local\\Programs\\Common\\Microsoft\\Visual C++ for Python\\9.0;;C:\\mozilla-build\\moztools\\bin',
09:53:37 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
09:53:37 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
09:53:37 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 62 Stepping 4, GenuineIntel',
09:53:37 INFO - 'PROCESSOR_LEVEL': '6',
09:53:37 INFO - 'PROCESSOR_REVISION': '3e04',
09:53:37 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
09:53:37 INFO - 'PROGRAMFILES': 'C:\\Program Files',
09:53:37 INFO - 'PROMPT': '$P$G',
09:53:37 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
09:53:37 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\;C:\\Program Files\\AWS Tools\\PowerShell\\',
09:53:37 INFO - 'PUBLIC': 'C:\\Users\\Public',
09:53:37 INFO - 'PWD': 'c:\\slave\\test',
09:53:37 INFO - 'RUNNER_CONFIG_CMD': 'C:\\opt\\runner\\Scripts\\python2.7.exe C:\\opt\\runner\\Scripts\\runner-script.py -c c:\\opt\\runner\\runner.cfg',
09:53:37 INFO - 'SYSTEMDRIVE': 'C:',
09:53:37 INFO - 'SYSTEMROOT': 'C:\\windows',
09:53:37 INFO - 'TEMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp',
09:53:37 INFO - 'TEST1': 'testie',
09:53:37 INFO - 'TMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp',
09:53:37 INFO - 'USERDOMAIN': 'T-W732-SPOT-530',
09:53:37 INFO - 'USERNAME': 'cltbld',
09:53:37 INFO - 'USERPROFILE': 'C:\\Users\\cltbld',
09:53:37 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
09:53:37 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
09:53:37 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
09:53:37 INFO - 'WINDIR': 'C:\\windows',
09:53:37 INFO - 'WINDOWS_TRACING_FLAGS': '3',
09:53:37 INFO - 'WINDOWS_TRACING_LOGFILE': 'C:\\BVTBin\\Tests\\installpackage\\csilogfile.log',
09:53:37 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
09:53:41 INFO - Ignoring indexes: http://pypi.python.org/simple/
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\manifestparser
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmanifestparser
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozcrash
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozcrash
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdebug
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdebug
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdevice
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdevice
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozfile
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozfile
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozhttpd
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozhttpd
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinfo
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinfo
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinstall
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinstall
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozleak
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozleak
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozlog
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozlog
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\moznetwork
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoznetwork
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprocess
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprocess
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprofile
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprofile
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozrunner
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozrunner
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozscreenshot
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozscreenshot
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\moztest
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoztest
09:53:41 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozversion
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozversion
09:53:41 INFO - Unpacking c:\slave\test\build\tests\tools\wptserve
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Ctools%5Cwptserve
09:53:41 INFO - Unpacking c:\slave\test\build\tests\marionette\client
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cclient
09:53:41 INFO - Unpacking c:\slave\test\build\tests\marionette\marionette\runner\mixins\browsermob-proxy-py
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cmarionette%5Crunner%5Cmixins%5Cbrowsermob-proxy-py
09:53:41 INFO - Unpacking c:\slave\test\build\tests\marionette
09:53:41 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette
09:53:41 INFO - warning: no files found matching '*.js' under directory 'marionette\touch'
09:53:41 INFO - Requirement already satisfied (use --upgrade to upgrade): mozfile>=1.0 in c:\slave\test\build\venv\lib\site-packages (from mozcrash->-r c:\slave\test\build\tests\config\mozbase_requirements.txt (line 2))
09:53:51 INFO - Requirement already satisfied (use --upgrade to upgrade): mozlog>=3.0 in c:\slave\test\build\venv\lib\site-packages (from mozcrash->-r c:\slave\test\build\tests\config\mozbase_requirements.txt (line 2))
09:53:51 INFO - Requirement already satisfied (use --upgrade to upgrade): mozinfo in c:\slave\test\build\venv\lib\site-packages (from mozdebug->-r c:\slave\test\build\tests\config\mozbase_requirements.txt (line 3))
09:53:51 INFO - Requirement already satisfied (use --upgrade to upgrade): moznetwork>=0.24 in c:\slave\test\build\venv\lib\site-packages (from mozdevice->-r c:\slave\test\build\tests\config\mozbase_requirements.txt (line 4))
09:53:51 INFO - Requirement already satisfied (use --upgrade to upgrade): mozprocess>=0.19 in c:\slave\test\build\venv\lib\site-packages (from mozdevice->-r c:\slave\test\build\tests\config\mozbase_requirements.txt (line 4))
09:53:51 INFO - Downloading/unpacking blessings>=1.3 (from mozlog->-r c:\slave\test\build\tests\config\mozbase_requirements.txt (line 10))
09:53:51 INFO - Downloading blessings-1.6.tar.gz
09:53:51 INFO - Running setup.py egg_info for package blessings
09:53:51 INFO - Requirement already satisfied (use --upgrade to upgrade): requests>=1.1.0 in c:\slave\test\build\venv\lib\site-packages (from browsermob-proxy->-r c:\slave\test\build\tests\config\marionette_requirements.txt (line 4))
09:53:51 INFO - Installing collected packages: blessings, browsermob-proxy, manifestparser, marionette-client, marionette-driver, mozcrash, mozdebug, mozdevice, mozhttpd, mozInstall, mozleak, mozprofile, mozrunner, mozscreenshot, moztest, mozversion, wptserve
09:53:51 INFO - Running setup.py install for blessings
09:53:51 INFO - Running setup.py install for browsermob-proxy
09:53:51 INFO - Running setup.py install for manifestparser
09:53:51 INFO - Installing manifestparser-script.py script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing manifestparser.exe script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Running setup.py install for marionette-client
09:53:51 INFO - warning: no files found matching '*.js' under directory 'marionette\touch'
09:53:51 INFO - Installing marionette-script.py script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing marionette.exe script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Running setup.py install for marionette-driver
09:53:51 INFO - Running setup.py install for mozcrash
09:53:51 INFO - Running setup.py install for mozdebug
09:53:51 INFO - Running setup.py install for mozdevice
09:53:51 INFO - Installing sutini-script.py script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing sutini.exe script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing dm-script.py script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing dm.exe script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Running setup.py install for mozhttpd
09:53:51 INFO - Installing mozhttpd-script.py script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing mozhttpd.exe script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Running setup.py install for mozInstall
09:53:51 INFO - Installing moz_remove_from_system-script.py script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing moz_remove_from_system.exe script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing mozuninstall-script.py script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing mozuninstall.exe script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing mozinstall-script.py script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing mozinstall.exe script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing moz_add_to_system-script.py script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing moz_add_to_system.exe script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Running setup.py install for mozleak
09:53:51 INFO - Running setup.py install for mozprofile
09:53:51 INFO - Installing mozprofile-script.py script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing mozprofile.exe script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing diff-profiles-script.py script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing diff-profiles.exe script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing view-profile-script.py script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing view-profile.exe script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Running setup.py install for mozrunner
09:53:51 INFO - Installing mozrunner-script.py script to c:\slave\test\build\venv\Scripts
09:53:51 INFO - Installing mozrunner.exe script to c:\slave\test\build\venv\Scripts
09:53:53 INFO - Running setup.py install for mozscreenshot
09:53:53 INFO - Running setup.py install for moztest
09:53:53 INFO - Running setup.py install for mozversion
09:53:53 INFO - Installing mozversion-script.py script to c:\slave\test\build\venv\Scripts
09:53:53 INFO - Installing mozversion.exe script to c:\slave\test\build\venv\Scripts
09:53:53 INFO - Running setup.py install for wptserve
09:53:53 INFO - Successfully installed blessings browsermob-proxy manifestparser marionette-client marionette-driver mozcrash mozdebug mozdevice mozhttpd mozInstall mozleak mozprofile mozrunner mozscreenshot moztest mozversion wptserve
09:53:53 INFO - Cleaning up...
09:53:53 INFO - Return code: 0
09:53:53 INFO - Done creating virtualenv c:\slave\test\build\venv.
09:53:53 INFO - Getting output from command: ['c:\\slave\\test\\build\\venv\\Scripts\\pip', 'freeze']
09:53:53 INFO - Copy/paste: c:\slave\test\build\venv\Scripts\pip freeze
09:53:53 INFO - Reading from file tmpfile_stdout
09:53:53 INFO - Using _rmtree_windows ...
09:53:53 INFO - Using _rmtree_windows ...
09:53:53 INFO - Current package versions:
09:53:53 INFO - blessings == 1.6
09:53:53 INFO - blobuploader == 1.2.4
09:53:53 INFO - browsermob-proxy == 0.6.0
09:53:53 INFO - distribute == 0.6.14
09:53:53 INFO - docopt == 0.6.1
09:53:53 INFO - functools32 == 3.2.3-2
09:53:53 INFO - jsonschema == 2.5.1
09:53:53 INFO - manifestparser == 1.1
09:53:53 INFO - marionette-client == 3.2.0
09:53:53 INFO - marionette-driver == 2.1.0
09:53:53 INFO - mozInstall == 1.12
09:53:53 INFO - mozcrash == 0.17
09:53:53 INFO - mozdebug == 0.1
09:53:53 INFO - mozdevice == 0.48
09:53:53 INFO - mozfile == 1.2
09:53:53 INFO - mozhttpd == 0.7
09:53:53 INFO - mozinfo == 0.9
09:53:53 INFO - mozleak == 0.1
09:53:53 INFO - mozlog == 3.4
09:53:53 INFO - moznetwork == 0.27
09:53:53 INFO - mozprocess == 0.23
09:53:53 INFO - mozprofile == 0.28
09:53:53 INFO - mozrunner == 6.12
09:53:53 INFO - mozscreenshot == 0.1
09:53:53 INFO - mozsystemmonitor == 0.3
09:53:53 INFO - moztest == 0.7
09:53:53 INFO - mozversion == 1.4
09:53:53 INFO - requests == 1.2.3
09:53:53 INFO - wptserve == 1.4.0
09:53:53 INFO - Running post-action listener: _resource_record_post_action
09:53:53 INFO - Running post-action listener: _start_resource_monitoring
09:53:53 INFO - Starting resource monitoring.
09:53:54 INFO - [mozharness: 2016-10-27 16:53:54.030000Z] Finished create-virtualenv step (success)
09:53:54 INFO - [mozharness: 2016-10-27 16:53:54.030000Z] Running pull step.
09:53:54 INFO - Running pre-action listener: _resource_record_pre_action
09:53:54 INFO - Running main action method: pull
09:53:54 INFO - Pull has nothing to do!
09:53:54 INFO - Running post-action listener: _resource_record_post_action
09:53:54 INFO - [mozharness: 2016-10-27 16:53:54.031000Z] Finished pull step (success)
09:53:54 INFO - [mozharness: 2016-10-27 16:53:54.031000Z] Running install step.
09:53:54 INFO - Running pre-action listener: _resource_record_pre_action
09:53:54 INFO - Running main action method: install
09:53:54 INFO - Getting output from command: ['c:\\slave\\test\\build\\venv\\Scripts\\pip', 'freeze']
09:53:54 INFO - Copy/paste: c:\slave\test\build\venv\Scripts\pip freeze
09:53:54 INFO - Reading from file tmpfile_stdout
09:53:54 INFO - Using _rmtree_windows ...
09:53:54 INFO - Using _rmtree_windows ...
09:53:54 INFO - Detecting whether we're running mozinstall >=1.0...
09:53:54 INFO - Getting output from command: ['c:\\slave\\test/build/venv/scripts/python', 'c:\\slave\\test/build/venv/scripts/mozinstall-script.py', '-h']
09:53:54 INFO - Copy/paste: c:\slave\test/build/venv/scripts/python c:\slave\test/build/venv/scripts/mozinstall-script.py -h
09:53:54 INFO - Reading from file tmpfile_stdout
09:53:54 INFO - Output received:
09:53:54 INFO - Usage: mozinstall-script.py [options] installer
09:53:54 INFO - Options:
09:53:54 INFO - -h, --help show this help message and exit
09:53:54 INFO - -d DEST, --destination=DEST
09:53:54 INFO - Directory to install application into. [default:
09:53:54 INFO - "c:\slave\test"]
09:53:54 INFO - --app=APP Application being installed. [default: firefox]
09:53:54 INFO - Using _rmtree_windows ...
09:53:54 INFO - Using _rmtree_windows ...
09:53:54 INFO - mkdir: c:\slave\test\build\application
09:53:54 INFO - Getting output from command: ['c:\\slave\\test/build/venv/scripts/python', 'c:\\slave\\test/build/venv/scripts/mozinstall-script.py', 'c:\\slave\\test\\build\\firefox-52.0a1.en-US.win32.zip', '--destination', 'c:\\slave\\test\\build\\application']
09:53:54 INFO - Copy/paste: c:\slave\test/build/venv/scripts/python c:\slave\test/build/venv/scripts/mozinstall-script.py c:\slave\test\build\firefox-52.0a1.en-US.win32.zip --destination c:\slave\test\build\application
09:53:56 INFO - Reading from file tmpfile_stdout
09:53:56 INFO - Output received:
09:53:56 INFO - c:\slave\test\build\application\firefox\firefox.exe
09:53:56 INFO - Using _rmtree_windows ...
09:53:56 INFO - Using _rmtree_windows ...
09:53:56 INFO - Running post-action listener: _resource_record_post_action
09:53:56 INFO - [mozharness: 2016-10-27 16:53:56.894000Z] Finished install step (success)
09:53:56 INFO - [mozharness: 2016-10-27 16:53:56.894000Z] Running run-tests step.
09:53:56 INFO - Running pre-action listener: _resource_record_pre_action
09:53:56 INFO - Running main action method: run_tests
09:53:56 INFO - mkdir: c:\slave\test\build\blobber_upload_dir
09:53:56 INFO - Minidump filename unknown. Determining based upon platform and architecture.
09:53:56 INFO - Minidump tooltool manifest unknown. Determining based upon platform and architecture.
09:53:56 INFO - grabbing minidump binary from tooltool
09:53:56 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
09:53:56 INFO - retry: Calling run_command with args: (['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'c:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'],), kwargs: {'output_timeout': 600, 'error_list': [{'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0125FDE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01D14180>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x01CC6480>, 'level': 'critical'}, {'substr': 'ERROR - ', 'level': 'error'}], 'cwd': 'c:\\slave\\test\\build', 'privileged': False}, attempt #1
09:53:56 INFO - Running command: ['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'c:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'] in c:\slave\test\build
09:53:56 INFO - Copy/paste: c:\mozilla-build\python27\python.exe C:/mozilla-build/tooltool.py --url https://api.pub.build.mozilla.org/tooltool/ --authentication-file c:\builds\relengapi.tok fetch -m c:\slave\test\build\tests\config/tooltool-manifests/win32/releng.manifest -o
09:53:56 INFO - Calling ['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'c:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'] with output_timeout 600
09:53:56 INFO - INFO - Attempting to fetch from 'https://api.pub.build.mozilla.org/tooltool/'...
09:53:59 INFO - INFO - File win32-minidump_stackwalk.exe fetched from https://api.pub.build.mozilla.org/tooltool/ as c:\slave\test\build\tmpuw5dex
09:53:59 INFO - INFO - File integrity verified, renaming tmpuw5dex to win32-minidump_stackwalk.exe
09:53:59 INFO - Return code: 0
09:53:59 INFO - Chmoding c:\slave\test\build\win32-minidump_stackwalk.exe to 0755
09:53:59 INFO - ENV: MINIDUMP_SAVE_PATH is now c:\slave\test\build\blobber_upload_dir
09:53:59 INFO - Running command: ['c:\\slave\\test\\build\\venv\\Scripts\\python', '-u', 'c:\\slave\\test\\build\\tests\\web-platform\\runtests.py', '--log-raw=-', '--log-raw=c:\\slave\\test\\build\\blobber_upload_dir\\wpt_raw.log', '--log-errorsummary=c:\\slave\\test\\build\\blobber_upload_dir\\wpt_errorsummary.log', '--binary=c:\\slave\\test\\build\\application\\firefox\\firefox.exe', '--symbols-path=https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip', '--stackwalk-binary=c:\\slave\\test\\build\\win32-minidump_stackwalk.exe', '--stackfix-dir=c:\\slave\\test\\build\\tests\\bin', '--test-type=testharness', '--total-chunks=10', '--this-chunk=9', '--prefs-root=c:\\slave\\test\\build\\tests\\web-platform/prefs', '--processes=1', '--config=c:\\slave\\test\\build\\tests\\web-platform/wptrunner.ini', '--ca-cert-path=c:\\slave\\test\\build\\tests\\web-platform/certs/cacert.pem', '--host-key-path=c:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.key', '--host-cert-path=c:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.pem', '--certutil-binary=c:\\slave\\test\\build\\tests/bin/certutil'] in c:\slave\test\build
09:53:59 INFO - Copy/paste: c:\slave\test\build\venv\Scripts\python -u c:\slave\test\build\tests\web-platform\runtests.py --log-raw=- --log-raw=c:\slave\test\build\blobber_upload_dir\wpt_raw.log --log-errorsummary=c:\slave\test\build\blobber_upload_dir\wpt_errorsummary.log --binary=c:\slave\test\build\application\firefox\firefox.exe --symbols-path=https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip --stackwalk-binary=c:\slave\test\build\win32-minidump_stackwalk.exe --stackfix-dir=c:\slave\test\build\tests\bin --test-type=testharness --total-chunks=10 --this-chunk=9 --prefs-root=c:\slave\test\build\tests\web-platform/prefs --processes=1 --config=c:\slave\test\build\tests\web-platform/wptrunner.ini --ca-cert-path=c:\slave\test\build\tests\web-platform/certs/cacert.pem --host-key-path=c:\slave\test\build\tests\web-platform/certs/web-platform.test.key --host-cert-path=c:\slave\test\build\tests\web-platform/certs/web-platform.test.pem --certutil-binary=c:\slave\test\build\tests/bin/certutil
09:53:59 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
09:53:59 INFO - 'APPDATA': 'C:\\Users\\cltbld\\AppData\\Roaming',
09:53:59 INFO - 'BUILDBOT_PATH': 'C:\\mozilla-build\\',
09:53:59 INFO - 'CHOCOLATEYINSTALL': 'C:\\ProgramData\\chocolatey',
09:53:59 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files',
09:53:59 INFO - 'COMPUTERNAME': 'T-W732-SPOT-530',
09:53:59 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
09:53:59 INFO - 'DCLOCATION': 'SCL3',
09:53:59 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE',
09:53:59 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
09:53:59 INFO - 'FP_NO_HOST_CHECK': 'NO',
09:53:59 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework',
09:53:59 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0',
09:53:59 INFO - 'FRAMEWORKVERSION': 'v2.0.50727',
09:53:59 INFO - 'GIT_SHARE_BASE_DIR': '/builds/git-shared',
09:53:59 INFO - 'HG_SHARE_BASE_DIR': '/builds/hg-shared',
09:53:59 INFO - 'HOMEDRIVE': 'C:',
09:53:59 INFO - 'HOMEPATH': '\\Users\\cltbld',
09:53:59 INFO - 'IDLEIZER_HALT_ON_IDLE': 'true',
09:53:59 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
09:53:59 INFO - 'KTS_VERSION': '1.19c',
09:53:59 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB',
09:53:59 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld\\AppData\\Local',
09:53:59 INFO - 'LOG': '"c:\\runner\\buildbot-startup.log"',
09:53:59 INFO - 'LOGONSERVER': '\\\\T-W732-SPOT-530',
09:53:59 INFO - 'MAKE_MODE': 'unix',
09:53:59 INFO - 'MINIDUMP_SAVE_PATH': 'c:\\slave\\test\\build\\blobber_upload_dir',
09:53:59 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build',
09:53:59 INFO - 'MOZILLABUILD': 'D:\\mozilla-build',
09:53:59 INFO - 'MOZILLABUILDDRIVE': 'C:',
09:53:59 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\',
09:53:59 INFO - 'MOZ_AIRBAG': '1',
09:53:59 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
09:53:59 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
09:53:59 INFO - 'MOZ_MSVCVERSION': '8',
09:53:59 INFO - 'MOZ_NO_REMOTE': '1',
09:53:59 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools',
09:53:59 INFO - 'MSVCDIR': 'D:\\msvs8\\VC',
09:53:59 INFO - 'MSYSTEM': 'MINGW32',
09:53:59 INFO - 'NO_EM_RESTART': '1',
09:53:59 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
09:53:59 INFO - 'NUMBER_OF_PROCESSORS': '8',
09:53:59 INFO - 'OS': 'Windows_NT',
09:53:59 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;c:\\Program Files\\Microsoft Windows Performance Toolkit\\;c:\\mozilla-build\\hg\\;C:\\Program Files (x86)\\Microsoft SDKs\\TypeScript\\1.0\\;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\facter\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\hiera\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\puppet\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\ruby\\bin;C:\\Program Files (x86)\\Puppet Labs\\Puppet\\sys\\tools\\bin;C:\\Program Files (x86)\\Windows Kits\\8.0\\Windows Performance Toolkit\\;C:\\Program Files (x86)\\Windows Kits\\8.1\\Windows Performance Toolkit\\;C:\\Program Files\\Amazon\\cfn-bootstrap\\;C:\\Program Files\\Microsoft SQL Server\\110\\Tools\\Binn\\;C:\\mozilla-build\\buildbotve;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\msys\\local\\bin;C:\\mozilla-build\\msys\\mingw\\bin;C:\\mozilla-build\\python27;C:\\opt\\runner;c:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Binn\\;c:\\Program Files\\Microsoft SQL Server\\100\\Tools\\Binn;C:\\Users\\cltbld\\AppData\\Local\\Programs\\Common\\Microsoft\\Visual C++ for Python\\9.0;;C:\\mozilla-build\\moztools\\bin',
09:53:59 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
09:53:59 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
09:53:59 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 62 Stepping 4, GenuineIntel',
09:53:59 INFO - 'PROCESSOR_LEVEL': '6',
09:53:59 INFO - 'PROCESSOR_REVISION': '3e04',
09:53:59 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
09:53:59 INFO - 'PROGRAMFILES': 'C:\\Program Files',
09:53:59 INFO - 'PROMPT': '$P$G',
09:53:59 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
09:53:59 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\;C:\\Program Files\\AWS Tools\\PowerShell\\',
09:53:59 INFO - 'PUBLIC': 'C:\\Users\\Public',
09:53:59 INFO - 'PWD': 'c:\\slave\\test',
09:53:59 INFO - 'RUNNER_CONFIG_CMD': 'C:\\opt\\runner\\Scripts\\python2.7.exe C:\\opt\\runner\\Scripts\\runner-script.py -c c:\\opt\\runner\\runner.cfg',
09:53:59 INFO - 'SYSTEMDRIVE': 'C:',
09:53:59 INFO - 'SYSTEMROOT': 'C:\\windows',
09:53:59 INFO - 'TEMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp',
09:53:59 INFO - 'TEST1': 'testie',
09:53:59 INFO - 'TMP': 'C:\\Users\\cltbld\\AppData\\Local\\Temp',
09:53:59 INFO - 'USERDOMAIN': 'T-W732-SPOT-530',
09:53:59 INFO - 'USERNAME': 'cltbld',
09:53:59 INFO - 'USERPROFILE': 'C:\\Users\\cltbld',
09:53:59 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC',
09:53:59 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat',
09:53:59 INFO - 'VSINSTALLDIR': 'D:\\msvs8',
09:53:59 INFO - 'WINDIR': 'C:\\windows',
09:53:59 INFO - 'WINDOWS_TRACING_FLAGS': '3',
09:53:59 INFO - 'WINDOWS_TRACING_LOGFILE': 'C:\\BVTBin\\Tests\\installpackage\\csilogfile.log',
09:53:59 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
09:53:59 INFO - Calling ['c:\\slave\\test\\build\\venv\\Scripts\\python', '-u', 'c:\\slave\\test\\build\\tests\\web-platform\\runtests.py', '--log-raw=-', '--log-raw=c:\\slave\\test\\build\\blobber_upload_dir\\wpt_raw.log', '--log-errorsummary=c:\\slave\\test\\build\\blobber_upload_dir\\wpt_errorsummary.log', '--binary=c:\\slave\\test\\build\\application\\firefox\\firefox.exe', '--symbols-path=https://queue.taskcluster.net/v1/task/SkGUEis5TP6wAilvA2pFEg/artifacts/public/build/firefox-52.0a1.en-US.win32.crashreporter-symbols.zip', '--stackwalk-binary=c:\\slave\\test\\build\\win32-minidump_stackwalk.exe', '--stackfix-dir=c:\\slave\\test\\build\\tests\\bin', '--test-type=testharness', '--total-chunks=10', '--this-chunk=9', '--prefs-root=c:\\slave\\test\\build\\tests\\web-platform/prefs', '--processes=1', '--config=c:\\slave\\test\\build\\tests\\web-platform/wptrunner.ini', '--ca-cert-path=c:\\slave\\test\\build\\tests\\web-platform/certs/cacert.pem', '--host-key-path=c:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.key', '--host-cert-path=c:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.pem', '--certutil-binary=c:\\slave\\test\\build\\tests/bin/certutil'] with output_timeout 1000
09:54:01 INFO - STDERR: c:\slave\test\build\venv\lib\site-packages\mozrunner\utils.py:18: UserWarning: Module wptserve was already imported from c:\slave\test\build\tests\web-platform\tests\tools\wptserve\wptserve\__init__.py, but c:\slave\test\build\venv\lib\site-packages is being added to sys.path
09:54:01 INFO - import pkg_resources
09:54:01 INFO - STDERR: Opening manifest at c:\slave\test\build\tests\web-platform\meta\MANIFEST.json
09:54:02 INFO - STDERR: Opening manifest at c:\slave\test\build\tests\web-platform\mozilla\meta\MANIFEST.json
09:54:07 INFO - Using 1 client processes
09:54:10 INFO - SUITE-START | Running 828 tests
09:54:10 INFO - Running testharness tests
09:54:10 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/pbkdf2.worker
09:54:10 INFO - TEST-SKIP | /WebCryptoAPI/derive_bits_keys/pbkdf2.worker | took 0ms
09:54:10 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_pbkdf2.html
09:54:10 INFO - TEST-SKIP | /WebCryptoAPI/derive_bits_keys/test_pbkdf2.html | took 0ms
09:54:10 INFO - TEST-START | /XMLHttpRequest/send-redirect-post-upload.htm
09:54:10 INFO - TEST-SKIP | /XMLHttpRequest/send-redirect-post-upload.htm | took 0ms
09:54:10 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-default-namespace.html
09:54:10 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-default-namespace.html | took 0ms
09:54:10 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-duplicate-definition.html
09:54:10 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-duplicate-definition.html | took 0ms
09:54:10 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-invalid-type.html
09:54:10 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-invalid-type.html | took 0ms
09:54:10 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-local-name-lowercased.html
09:54:10 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-local-name-lowercased.html | took 0ms
09:54:10 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-name-is-null.html
09:54:10 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-name-is-null.html | took 0ms
09:54:10 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-no-interface-for-name.html
09:54:10 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-no-interface-for-name.html | took 0ms
09:54:10 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace-name-is-null.html
09:54:10 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace-name-is-null.html | took 0ms
09:54:10 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace.html
09:54:10 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace.html | took 1ms
09:54:10 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-type-name-lowercased.html
09:54:10 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-type-name-lowercased.html | took 0ms
09:54:10 INFO - TEST-START | /custom-elements/v0/registering/element-registration-algorithm-no-registry.html
09:54:10 INFO - TEST-SKIP | /custom-elements/v0/registering/element-registration-algorithm-no-registry.html | took 1ms
09:54:10 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-html-element.html
09:54:10 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-html-element.html | took 0ms
09:54:10 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-html-unknown-element.html
09:54:10 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-html-unknown-element.html | took 1ms
09:54:10 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-svg-element.html
09:54:10 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-svg-element.html | took 0ms
09:54:10 INFO - TEST-START | /dom/nodes/Document-contentType/contentType/contenttype_bmp.html
09:54:10 INFO - TEST-SKIP | /dom/nodes/Document-contentType/contentType/contenttype_bmp.html | took 1ms
09:54:10 INFO - TEST-START | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_1.html
09:54:10 INFO - TEST-SKIP | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_1.html | took 0ms
09:54:10 INFO - TEST-START | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_2.html
09:54:10 INFO - TEST-SKIP | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_2.html | took 1ms
09:54:10 INFO - TEST-START | /referrer-policy/generic/subresource-test/area-navigate.html
09:54:10 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/area-navigate.html | took 0ms
09:54:10 INFO - TEST-START | /referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html
09:54:10 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html | took 0ms
09:54:10 INFO - TEST-START | /referrer-policy/generic/subresource-test/fetch-messaging.html
09:54:10 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/fetch-messaging.html | took 0ms
09:54:10 INFO - TEST-START | /referrer-policy/generic/subresource-test/iframe-messaging.html
09:54:10 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/iframe-messaging.html | took 0ms
09:54:10 INFO - TEST-START | /referrer-policy/generic/subresource-test/image-decoding.html
09:54:10 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/image-decoding.html | took 0ms
09:54:10 INFO - TEST-START | /referrer-policy/generic/subresource-test/link-navigate.html
09:54:10 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/link-navigate.html | took 0ms
09:54:10 INFO - TEST-START | /referrer-policy/generic/subresource-test/script-messaging.html
09:54:10 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/script-messaging.html | took 0ms
09:54:10 INFO - TEST-START | /referrer-policy/generic/subresource-test/worker-messaging.html
09:54:10 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/worker-messaging.html | took 0ms
09:54:10 INFO - TEST-START | /referrer-policy/generic/subresource-test/xhr-messaging.html
09:54:10 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/xhr-messaging.html | took 88ms
09:54:10 INFO - TEST-START | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html
09:54:10 INFO - TEST-SKIP | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html | took 0ms
09:54:10 INFO - TEST-START | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html
09:54:10 INFO - TEST-SKIP | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html | took 0ms
09:54:10 INFO - TEST-START | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html
09:54:10 INFO - TEST-SKIP | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html | took 0ms
09:54:10 INFO - TEST-START | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html
09:54:10 INFO - TEST-SKIP | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html | took 1ms
09:54:10 INFO - TEST-START | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html
09:54:10 INFO - TEST-SKIP | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html | took 0ms
09:54:10 INFO - TEST-START | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html
09:54:10 INFO - TEST-SKIP | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html | took 0ms
09:54:10 INFO - TEST-START | /service-workers/service-worker/appcache-ordering-main.https.html
09:54:10 INFO - TEST-SKIP | /service-workers/service-worker/appcache-ordering-main.https.html | took 1ms
09:54:10 INFO - TEST-START | /service-workers/service-worker/resource-timing.https.html
09:54:10 INFO - TEST-SKIP | /service-workers/service-worker/resource-timing.https.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat3-construction.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat3-construction.html | took 1ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat4-to-mat3.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat4-to-mat3.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_field.vert.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_field.vert.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_function.vert.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_function.vert.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_struct.vert.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_struct.vert.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_variable.vert.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_variable.vert.html | took 1ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_field.vert.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_field.vert.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_function.vert.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_function.vert.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_struct.vert.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_struct.vert.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_variable.vert.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_variable.vert.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord-xy-values.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord-xy-values.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragdata-and-fragcolor.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragdata-and-fragcolor.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-frontfacing.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-frontfacing.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-pointcoord.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-pointcoord.html | took 1ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/glsl-built-ins.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/glsl-built-ins.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_001_to_008.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_001_to_008.html | took 1ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_009_to_012.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_009_to_012.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_001_to_008.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_001_to_008.html | took 1ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_009_to_010.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_009_to_010.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_001_to_008.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_001_to_008.html | took 1ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_009_to_012.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_009_to_012.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/mat3/mat3_001_to_006.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/mat3/mat3_001_to_006.html | took 1ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/matrixCompMult/matrixCompMult_001_to_004.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/matrixCompMult/matrixCompMult_001_to_004.html | took 0ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/min/min_001_to_006.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/min/min_001_to_006.html | took 1ms
09:54:10 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/step/step_001_to_006.html
09:54:10 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/step/step_001_to_006.html | took 0ms
09:54:10 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/001.html
09:54:10 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/001.html | took 1ms
09:54:10 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/001.html?wss
09:54:10 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/001.html?wss | took 0ms
09:54:10 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/002.html
09:54:10 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/002.html | took 1ms
09:54:10 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/002.html?wss
09:54:10 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/002.html?wss | took 0ms
09:54:10 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/003.html?wss
09:54:10 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/003.html?wss | took 0ms
09:54:10 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/003.html
09:54:10 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/003.html | took 0ms
09:54:10 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/004.html?wss
09:54:10 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/004.html?wss | took 0ms
09:54:10 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/004.html
09:54:10 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/004.html | took 1ms
09:54:10 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/005.html?wss
09:54:10 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/005.html?wss | took 0ms
09:54:10 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/005.html
09:54:10 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/005.html | took 1ms
09:54:10 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/006.html
09:54:10 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/006.html | took 0ms
09:54:10 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/006.html?wss
09:54:10 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/006.html?wss | took 0ms
09:54:10 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/007.html
09:54:10 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/007.html | took 1ms
09:54:10 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/007.html?wss
09:54:10 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/007.html?wss | took 0ms
09:54:10 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/008.html?wss
09:54:10 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/008.html?wss | took 0ms
09:54:10 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/008.html
09:54:10 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/008.html | took 1ms
09:54:11 INFO - Setting up ssl
09:54:11 INFO - PROCESS | certutil |
09:54:11 INFO - PROCESS | certutil |
09:54:11 INFO - PROCESS | certutil |
09:54:11 INFO - Certificate Nickname Trust Attributes
09:54:11 INFO - SSL,S/MIME,JAR/XPI
09:54:11 INFO -
09:54:11 INFO - web-platform-tests CT,,
09:54:11 INFO -
09:54:11 INFO - Application command: c:\slave\test\build\application\firefox\firefox.exe -marionette about:blank -profile c:\users\cltbld\appdata\local\temp\tmpsus5rg.mozrunner
09:54:11 INFO - Starting runner
09:54:11 INFO - PROCESS | 3468 | [3468] WARNING: Failed to load startupcache file correctly, removing!: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/startupcache/StartupCache.cpp, line 219
09:54:12 INFO - PROCESS | 3468 | [3468] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80004005: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpcom/base/nsSystemInfo.cpp, line 116
09:54:12 INFO - PROCESS | 3468 | [3468] WARNING: This method is lossy. Use GetCanonicalPath !: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpcom/io/nsLocalFileWin.cpp, line 3579
09:54:13 INFO - PROCESS | 3468 | 1477587253849 Marionette DEBUG Marionette enabled via build flag and pref
09:54:14 INFO - PROCESS | 3468 | ++DOCSHELL 0F56F800 == 1 [pid = 3468] [id = 1]
09:54:14 INFO - PROCESS | 3468 | ++DOMWINDOW == 1 (0F56FC00) [pid = 3468] [serial = 1] [outer = 00000000]
09:54:14 INFO - PROCESS | 3468 | ++DOMWINDOW == 2 (0F570800) [pid = 3468] [serial = 2] [outer = 0F56FC00]
09:54:14 INFO - PROCESS | 3468 | [3468] WARNING: DWM not enabled, falling back to software vsync: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/gfx/thebes/gfxWindowsPlatform.cpp, line 1971
09:54:14 INFO - PROCESS | 3468 | ++DOCSHELL 0F0C7000 == 2 [pid = 3468] [id = 2]
09:54:14 INFO - PROCESS | 3468 | ++DOMWINDOW == 3 (0F0C7400) [pid = 3468] [serial = 3] [outer = 00000000]
09:54:14 INFO - PROCESS | 3468 | ++DOMWINDOW == 4 (0F0C8000) [pid = 3468] [serial = 4] [outer = 0F0C7400]
09:54:15 INFO - PROCESS | 3468 | 1477587255343 Marionette INFO Listening on port 2828
09:54:16 INFO - PROCESS | 3468 | 1477587256859 Marionette DEBUG Marionette enabled via command-line flag
09:54:16 INFO - PROCESS | 3468 | [3468] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
09:54:16 INFO - PROCESS | 3468 | [3468] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
09:54:16 INFO - PROCESS | 3468 | [3468] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
09:54:16 INFO - PROCESS | 3468 | [3468] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
09:54:16 INFO - PROCESS | 3468 | ++DOCSHELL 11FA7800 == 3 [pid = 3468] [id = 3]
09:54:16 INFO - PROCESS | 3468 | ++DOMWINDOW == 5 (11FA7C00) [pid = 3468] [serial = 5] [outer = 00000000]
09:54:16 INFO - PROCESS | 3468 | ++DOMWINDOW == 6 (11FA8800) [pid = 3468] [serial = 6] [outer = 11FA7C00]
09:54:17 INFO - PROCESS | 3468 | ++DOMWINDOW == 7 (11E0C800) [pid = 3468] [serial = 7] [outer = 0F0C7400]
09:54:17 INFO - PROCESS | 3468 | 1477587257624 Marionette DEBUG Accepted connection conn0 from 127.0.0.1:49336
09:54:17 INFO - PROCESS | 3468 | 1477587257643 Marionette DEBUG Accepted connection conn1 from 127.0.0.1:49337
09:54:17 INFO - PROCESS | 3468 | 1477587257650 Marionette DEBUG Accepted connection conn2 from 127.0.0.1:49338
09:54:17 INFO - PROCESS | 3468 | 1477587257684 Marionette DEBUG Accepted connection conn3 from 127.0.0.1:49339
09:54:17 INFO - PROCESS | 3468 | 1477587257687 Marionette DEBUG Closed connection conn0
09:54:17 INFO - PROCESS | 3468 | 1477587257689 Marionette DEBUG Closed connection conn1
09:54:17 INFO - PROCESS | 3468 | 1477587257691 Marionette DEBUG Closed connection conn2
09:54:17 INFO - PROCESS | 3468 | 1477587257779 Marionette DEBUG Closed connection conn3
09:54:17 INFO - PROCESS | 3468 | 1477587257784 Marionette DEBUG Accepted connection conn4 from 127.0.0.1:49340
09:54:17 INFO - PROCESS | 3468 | 1477587257856 Marionette DEBUG Closed connection conn4
09:54:17 INFO - PROCESS | 3468 | 1477587257862 Marionette DEBUG Accepted connection conn5 from 127.0.0.1:49341
09:54:17 INFO - PROCESS | 3468 | 1477587257974 Marionette TRACE conn5 -> [0,1,"newSession",{"sessionId":null,"capabilities":null}]
09:54:17 INFO - PROCESS | 3468 | 1477587257981 Marionette CONFIG Changing capabilities: {"browserName":"firefox","browserVersion":"52.0a1","platformName":"windows_nt","platformVersion":"6.1","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20161027075434","processId":3468,"version":"52.0a1"}
09:54:18 INFO - PROCESS | 3468 | [Child 3248] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80004005: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/toolkit/xre/nsXREDirProvider.cpp, line 1703
09:54:18 INFO - PROCESS | 3468 | [Child 3248] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80004005: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpcom/base/nsSystemInfo.cpp, line 116
09:54:18 INFO - PROCESS | 3468 | [Parent 3468] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1553
09:54:18 INFO - PROCESS | 3468 | [Parent 3468] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1553
09:54:18 INFO - PROCESS | 3468 | [Parent 3468] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
09:54:18 INFO - PROCESS | 3468 | ++DOCSHELL 09046C00 == 1 [pid = 3248] [id = 1]
09:54:18 INFO - PROCESS | 3468 | ++DOMWINDOW == 1 (09047000) [pid = 3248] [serial = 1] [outer = 00000000]
09:54:18 INFO - PROCESS | 3468 | ++DOMWINDOW == 2 (0A61F000) [pid = 3248] [serial = 2] [outer = 09047000]
09:54:18 INFO - PROCESS | 3468 | ++DOMWINDOW == 3 (0A624800) [pid = 3248] [serial = 3] [outer = 09047000]
09:54:18 INFO - PROCESS | 3468 | ++DOCSHELL 15240C00 == 4 [pid = 3468] [id = 4]
09:54:18 INFO - PROCESS | 3468 | ++DOMWINDOW == 8 (15241000) [pid = 3468] [serial = 8] [outer = 00000000]
09:54:18 INFO - PROCESS | 3468 | ++DOCSHELL 15241800 == 5 [pid = 3468] [id = 5]
09:54:18 INFO - PROCESS | 3468 | ++DOMWINDOW == 9 (15241C00) [pid = 3468] [serial = 9] [outer = 00000000]
09:54:19 INFO - PROCESS | 3468 | ++DOCSHELL 163CC400 == 6 [pid = 3468] [id = 6]
09:54:19 INFO - PROCESS | 3468 | ++DOMWINDOW == 10 (163CC800) [pid = 3468] [serial = 10] [outer = 00000000]
09:54:19 INFO - PROCESS | 3468 | ++DOMWINDOW == 11 (16838800) [pid = 3468] [serial = 11] [outer = 163CC800]
09:54:19 INFO - PROCESS | 3468 | ++DOCSHELL 0A950400 == 2 [pid = 3248] [id = 2]
09:54:19 INFO - PROCESS | 3468 | ++DOMWINDOW == 4 (0A950800) [pid = 3248] [serial = 4] [outer = 00000000]
09:54:19 INFO - PROCESS | 3468 | ++DOMWINDOW == 12 (16BBE400) [pid = 3468] [serial = 12] [outer = 15241000]
09:54:19 INFO - PROCESS | 3468 | ++DOMWINDOW == 13 (16BBF400) [pid = 3468] [serial = 13] [outer = 15241C00]
09:54:19 INFO - PROCESS | 3468 | [Parent 3468] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
09:54:19 INFO - PROCESS | 3468 | [Parent 3468] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
09:54:19 INFO - PROCESS | 3468 | ++DOMWINDOW == 5 (0C728000) [pid = 3248] [serial = 5] [outer = 0A950800]
09:54:19 INFO - PROCESS | 3468 | ++DOMWINDOW == 6 (0A94F800) [pid = 3248] [serial = 6] [outer = 0A950800]
09:54:20 INFO - PROCESS | 3468 | ++DOMWINDOW == 7 (0C922800) [pid = 3248] [serial = 7] [outer = 0A950800]
09:54:21 INFO - PROCESS | 3468 | 1477587261447 Marionette TRACE conn5 <- [1,1,null,{"sessionId":"31818b80-d486-42d3-8a6f-460493501305","capabilities":{"browserName":"firefox","browserVersion":"52.0a1","platformName":"windows_nt","platformVersion":"6.1","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20161027075434","processId":3468,"version":"52.0a1","command_id":1}}]
09:54:21 INFO - PROCESS | 3468 | 1477587261678 Marionette TRACE conn5 -> [0,2,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":137}]
09:54:21 INFO - PROCESS | 3468 | 1477587261832 Marionette TRACE conn5 <- [1,2,null,{"value":null}]
09:54:21 INFO - PROCESS | 3468 | 1477587261851 Marionette TRACE conn5 -> [0,3,"getWindowHandle",null]
09:54:21 INFO - PROCESS | 3468 | 1477587261856 Marionette TRACE conn5 <- [1,3,null,{"value":"2147483652"}]
09:54:21 INFO - PROCESS | 3468 | 1477587261871 Marionette TRACE conn5 -> [0,4,"get",{"url":"http://web-platform.test:8000/testharness_runner.html"}]
09:54:21 INFO - PROCESS | 3468 | [Child 3248] WARNING: site security information will not be persisted: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/security/manager/ssl/nsSiteSecurityService.cpp, line 268
09:54:21 INFO - PROCESS | 3468 | [Parent 3468] WARNING: Could not get disk status from nsIDiskSpaceWatcher: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/uriloader/prefetch/nsOfflineCacheUpdateService.cpp, line 283
09:54:22 INFO - PROCESS | 3468 | ++DOMWINDOW == 8 (0D28E400) [pid = 3248] [serial = 8] [outer = 0A950800]
09:54:22 INFO - PROCESS | 3468 | 1477587262610 Marionette TRACE conn5 <- [1,4,null,{}]
09:54:22 INFO - PROCESS | 3468 | 1477587262625 Marionette TRACE conn5 -> [0,5,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"document.title = 'MainThread'","sandbox":"default","line":150}]
09:54:22 INFO - PROCESS | 3468 | 1477587262654 Marionette TRACE conn5 <- [1,5,null,{"value":null}]
09:54:22 INFO - PROCESS | 3468 | 1477587262676 Marionette TRACE conn5 -> [0,6,"getWindowHandle",null]
09:54:22 INFO - PROCESS | 3468 | 1477587262681 Marionette TRACE conn5 <- [1,6,null,{"value":"2147483652"}]
09:54:22 INFO - PROCESS | 3468 | 1477587262685 Marionette TRACE conn5 -> [0,7,"timeouts",{"script":35000}]
09:54:22 INFO - TEST-START | /2dcontext/image-smoothing/imagesmoothing.html
09:54:22 INFO - PROCESS | 3468 | 1477587262688 Marionette TRACE conn5 <- [1,7,null,{}]
09:54:22 INFO - PROCESS | 3468 | 1477587262692 Marionette TRACE conn5 -> [0,8,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:54:22 INFO - PROCESS | 3468 | 1477587262761 Marionette TRACE conn5 <- [1,8,null,{"value":null}]
09:54:22 INFO - PROCESS | 3468 | 1477587262765 Marionette TRACE conn5 -> [0,9,"getWindowHandles",null]
09:54:22 INFO - PROCESS | 3468 | 1477587262767 Marionette TRACE conn5 <- [1,9,null,["2147483652"]]
09:54:22 INFO - PROCESS | 3468 | 1477587262771 Marionette TRACE conn5 -> [0,10,"switchToWindow",{"name":"2147483652"}]
09:54:22 INFO - PROCESS | 3468 | 1477587262775 Marionette TRACE conn5 <- [1,10,null,{}]
09:54:22 INFO - PROCESS | 3468 | 1477587262784 Marionette TRACE conn5 -> [0,11,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/2dcontext/image-smoothing/imagesmoothing.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/2dcontext/image-smoothing/imagesmoothing.html\", \"a2dd4c07-c72f-4f35-a3ec-e382f3c43033\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:54:22 INFO - PROCESS | 3468 | ++DOCSHELL 0D30E400 == 3 [pid = 3248] [id = 3]
09:54:22 INFO - PROCESS | 3468 | ++DOMWINDOW == 9 (0D30E800) [pid = 3248] [serial = 9] [outer = 00000000]
09:54:22 INFO - PROCESS | 3468 | ++DOMWINDOW == 10 (0D3F1400) [pid = 3248] [serial = 10] [outer = 0D30E800]
09:54:22 INFO - PROCESS | 3468 | ++DOMWINDOW == 11 (0D3F3C00) [pid = 3248] [serial = 11] [outer = 0D30E800]
09:54:22 INFO - PROCESS | 3468 | ++DOCSHELL 1AE2DC00 == 7 [pid = 3468] [id = 7]
09:54:22 INFO - PROCESS | 3468 | ++DOMWINDOW == 14 (1AEE0400) [pid = 3468] [serial = 14] [outer = 00000000]
09:54:23 INFO - PROCESS | 3468 | ++DOMWINDOW == 15 (1AEEA800) [pid = 3468] [serial = 15] [outer = 1AEE0400]
09:54:23 INFO - PROCESS | 3468 | 1477587263042 Marionette DEBUG loaded listener.js
09:54:23 INFO - PROCESS | 3468 | ++DOMWINDOW == 16 (12867C00) [pid = 3468] [serial = 16] [outer = 1AEE0400]
09:54:23 INFO - PROCESS | 3468 | 1477587263642 Marionette TRACE conn5 <- [1,11,null,{"value":["/2dcontext/image-smoothing/imagesmoothing.html",0,null,null,[["When the canvas context is created, imageSmoothingEnabled must be set to true.",0,null,null],["On getting imageSmoothingEnabled, the user agent must return the last value it was set to.",0,null,null],["Test that image smoothing is actually on by default and just the attribute value.",0,null,null],["Test that image smoothing works when imageSmoothingEnabled is set to true",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with drawImage().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with fillRect and createPattern().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with fill() and createPattern().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with stroke() and createPattern().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) still works after repaints.",0,null,null]]]}]
09:54:23 INFO - .........
09:54:23 INFO - TEST-OK | /2dcontext/image-smoothing/imagesmoothing.html | took 1067ms
09:54:23 INFO - PROCESS | 3468 | 1477587263758 Marionette TRACE conn5 -> [0,12,"getWindowHandle",null]
09:54:23 INFO - PROCESS | 3468 | 1477587263760 Marionette TRACE conn5 <- [1,12,null,{"value":"2147483652"}]
09:54:23 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/ecdh_bits.worker
09:54:23 INFO - PROCESS | 3468 | 1477587263765 Marionette TRACE conn5 -> [0,13,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:54:23 INFO - PROCESS | 3468 | 1477587263848 Marionette TRACE conn5 <- [1,13,null,{"value":null}]
09:54:23 INFO - PROCESS | 3468 | 1477587263871 Marionette TRACE conn5 -> [0,14,"getWindowHandles",null]
09:54:23 INFO - PROCESS | 3468 | 1477587263873 Marionette TRACE conn5 <- [1,14,null,["2147483652"]]
09:54:23 INFO - PROCESS | 3468 | 1477587263878 Marionette TRACE conn5 -> [0,15,"switchToWindow",{"name":"2147483652"}]
09:54:23 INFO - PROCESS | 3468 | 1477587263881 Marionette TRACE conn5 <- [1,15,null,{}]
09:54:23 INFO - PROCESS | 3468 | 1477587263885 Marionette TRACE conn5 -> [0,16,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker\", \"a2dd4c07-c72f-4f35-a3ec-e382f3c43033\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:54:23 INFO - PROCESS | 3468 | ++DOCSHELL 0D5F6000 == 4 [pid = 3248] [id = 4]
09:54:23 INFO - PROCESS | 3468 | ++DOMWINDOW == 12 (0D5F6800) [pid = 3248] [serial = 12] [outer = 00000000]
09:54:23 INFO - PROCESS | 3468 | ++DOMWINDOW == 13 (0DA0E400) [pid = 3248] [serial = 13] [outer = 0D5F6800]
09:54:24 INFO - PROCESS | 3468 | ++DOMWINDOW == 14 (0DA10C00) [pid = 3248] [serial = 14] [outer = 0D5F6800]
09:54:24 INFO - PROCESS | 3468 | --DOCSHELL 0F56F800 == 6 [pid = 3468] [id = 1]
09:54:26 INFO - PROCESS | 3468 | ++DOCSHELL 0D14A000 == 7 [pid = 3468] [id = 8]
09:54:26 INFO - PROCESS | 3468 | ++DOMWINDOW == 17 (0D14A800) [pid = 3468] [serial = 17] [outer = 00000000]
09:54:26 INFO - PROCESS | 3468 | ++DOMWINDOW == 18 (0D150400) [pid = 3468] [serial = 18] [outer = 0D14A800]
09:54:26 INFO - PROCESS | 3468 | ++DOMWINDOW == 19 (0D1B0800) [pid = 3468] [serial = 19] [outer = 0D14A800]
09:54:26 INFO - PROCESS | 3468 | ++DOCSHELL 0D151C00 == 8 [pid = 3468] [id = 9]
09:54:26 INFO - PROCESS | 3468 | ++DOMWINDOW == 20 (0D154400) [pid = 3468] [serial = 20] [outer = 00000000]
09:54:26 INFO - PROCESS | 3468 | ++DOMWINDOW == 21 (0D386400) [pid = 3468] [serial = 21] [outer = 0D154400]
09:54:26 INFO - PROCESS | 3468 | ++DOMWINDOW == 22 (0DC4FC00) [pid = 3468] [serial = 22] [outer = 0D154400]
09:54:26 INFO - PROCESS | 3468 | --DOCSHELL 163CC400 == 7 [pid = 3468] [id = 6]
09:54:29 INFO - PROCESS | 3468 | --DOCSHELL 0D30E400 == 3 [pid = 3248] [id = 3]
09:54:29 INFO - PROCESS | 3468 | --DOCSHELL 09046C00 == 2 [pid = 3248] [id = 1]
09:54:33 INFO - PROCESS | 3468 | --DOMWINDOW == 21 (0F56FC00) [pid = 3468] [serial = 1] [outer = 00000000] [url = chrome://gfxsanity/content/sanityparent.html]
09:54:33 INFO - PROCESS | 3468 | --DOMWINDOW == 20 (163CC800) [pid = 3468] [serial = 10] [outer = 00000000] [url = about:blank]
09:54:36 INFO - PROCESS | 3468 | --DOMWINDOW == 13 (09047000) [pid = 3248] [serial = 1] [outer = 00000000] [url = chrome://gfxsanity/content/sanitytest.html]
09:54:36 INFO - PROCESS | 3468 | --DOMWINDOW == 12 (0D30E800) [pid = 3248] [serial = 9] [outer = 00000000] [url = http://web-platform.test:8000/2dcontext/image-smoothing/imagesmoothing.html]
09:54:38 INFO - PROCESS | 3468 | --DOMWINDOW == 19 (1AEEA800) [pid = 3468] [serial = 15] [outer = 00000000] [url = about:blank]
09:54:38 INFO - PROCESS | 3468 | --DOMWINDOW == 18 (16838800) [pid = 3468] [serial = 11] [outer = 00000000] [url = about:blank]
09:54:38 INFO - PROCESS | 3468 | --DOMWINDOW == 17 (0F570800) [pid = 3468] [serial = 2] [outer = 00000000] [url = about:blank]
09:54:38 INFO - PROCESS | 3468 | --DOMWINDOW == 16 (0F0C8000) [pid = 3468] [serial = 4] [outer = 00000000] [url = about:blank]
09:54:38 INFO - PROCESS | 3468 | --DOMWINDOW == 15 (0D386400) [pid = 3468] [serial = 21] [outer = 00000000] [url = about:blank]
09:54:38 INFO - PROCESS | 3468 | --DOMWINDOW == 14 (0D150400) [pid = 3468] [serial = 18] [outer = 00000000] [url = about:blank]
09:54:40 INFO - PROCESS | 3468 | --DOMWINDOW == 11 (0A61F000) [pid = 3248] [serial = 2] [outer = 00000000] [url = about:blank]
09:54:40 INFO - PROCESS | 3468 | --DOMWINDOW == 10 (0A624800) [pid = 3248] [serial = 3] [outer = 00000000] [url = chrome://gfxsanity/content/sanitytest.html]
09:54:40 INFO - PROCESS | 3468 | --DOMWINDOW == 9 (0C728000) [pid = 3248] [serial = 5] [outer = 00000000] [url = about:blank]
09:54:40 INFO - PROCESS | 3468 | --DOMWINDOW == 8 (0D3F3C00) [pid = 3248] [serial = 11] [outer = 00000000] [url = about:blank]
09:54:40 INFO - PROCESS | 3468 | --DOMWINDOW == 7 (0DA0E400) [pid = 3248] [serial = 13] [outer = 00000000] [url = about:blank]
09:54:40 INFO - PROCESS | 3468 | --DOMWINDOW == 6 (0D3F1400) [pid = 3248] [serial = 10] [outer = 00000000] [url = about:blank]
09:54:47 INFO - PROCESS | 3468 | --DOMWINDOW == 5 (0A94F800) [pid = 3248] [serial = 6] [outer = 00000000] [url = about:blank]
09:54:54 INFO - PROCESS | 3468 | MARIONETTE LOG: INFO: Timeout fired
09:54:54 INFO - PROCESS | 3468 | 1477587294095 Marionette TRACE conn5 <- [1,16,null,{"value":["/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker",2,null,null,[]]}]
09:54:54 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/ecdh_bits.worker | took 30373ms
09:54:54 INFO - PROCESS | 3468 | 1477587294142 Marionette TRACE conn5 -> [0,17,"getWindowHandle",null]
09:54:54 INFO - PROCESS | 3468 | 1477587294148 Marionette TRACE conn5 <- [1,17,null,{"value":"2147483652"}]
09:54:54 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/ecdh_keys.worker
09:54:54 INFO - PROCESS | 3468 | 1477587294155 Marionette TRACE conn5 -> [0,18,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:54:54 INFO - PROCESS | 3468 | 1477587294270 Marionette TRACE conn5 <- [1,18,null,{"value":null}]
09:54:54 INFO - PROCESS | 3468 | 1477587294287 Marionette TRACE conn5 -> [0,19,"getWindowHandles",null]
09:54:54 INFO - PROCESS | 3468 | 1477587294291 Marionette TRACE conn5 <- [1,19,null,["2147483652"]]
09:54:54 INFO - PROCESS | 3468 | 1477587294296 Marionette TRACE conn5 -> [0,20,"switchToWindow",{"name":"2147483652"}]
09:54:54 INFO - PROCESS | 3468 | 1477587294303 Marionette TRACE conn5 <- [1,20,null,{}]
09:54:54 INFO - PROCESS | 3468 | 1477587294307 Marionette TRACE conn5 -> [0,21,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker\", \"a2dd4c07-c72f-4f35-a3ec-e382f3c43033\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:54:54 INFO - PROCESS | 3468 | ++DOCSHELL 0889B000 == 3 [pid = 3248] [id = 5]
09:54:54 INFO - PROCESS | 3468 | ++DOMWINDOW == 6 (0889D400) [pid = 3248] [serial = 15] [outer = 00000000]
09:54:54 INFO - PROCESS | 3468 | ++DOMWINDOW == 7 (09041400) [pid = 3248] [serial = 16] [outer = 0889D400]
09:54:54 INFO - PROCESS | 3468 | [Parent 3468] WARNING: pipe error: 109: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/ipc/chromium/src/chrome/common/ipc_channel_win.cc, line 345
09:54:54 INFO - PROCESS | 3468 | ++DOMWINDOW == 8 (0A61E400) [pid = 3248] [serial = 17] [outer = 0889D400]
09:54:56 INFO - PROCESS | 3468 | ++DOMWINDOW == 15 (0F273C00) [pid = 3468] [serial = 23] [outer = 0D154400]
09:55:02 INFO - PROCESS | 3468 | --DOCSHELL 0D5F6000 == 2 [pid = 3248] [id = 4]
09:55:08 INFO - PROCESS | 3468 | --DOMWINDOW == 7 (0D5F6800) [pid = 3248] [serial = 12] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker]
09:55:12 INFO - PROCESS | 3468 | --DOMWINDOW == 14 (0DC4FC00) [pid = 3468] [serial = 22] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
09:55:13 INFO - PROCESS | 3468 | --DOMWINDOW == 6 (0DA10C00) [pid = 3248] [serial = 14] [outer = 00000000] [url = about:blank]
09:55:20 INFO - PROCESS | 3468 | 1477587320439 addons.productaddons WARN Failed downloading XML, status: 0, reason: error
09:55:23 INFO - PROCESS | 3468 | --DOMWINDOW == 5 (09041400) [pid = 3248] [serial = 16] [outer = 00000000] [url = about:blank]
09:55:24 INFO - PROCESS | 3468 | MARIONETTE LOG: INFO: Timeout fired
09:55:24 INFO - PROCESS | 3468 | 1477587324580 Marionette TRACE conn5 <- [1,21,null,{"value":["/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker",2,null,null,[]]}]
09:55:24 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/ecdh_keys.worker | took 30464ms
09:55:24 INFO - PROCESS | 3468 | 1477587324621 Marionette TRACE conn5 -> [0,22,"getWindowHandle",null]
09:55:24 INFO - PROCESS | 3468 | 1477587324625 Marionette TRACE conn5 <- [1,22,null,{"value":"2147483652"}]
09:55:24 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/hkdf.worker
09:55:24 INFO - PROCESS | 3468 | 1477587324655 Marionette TRACE conn5 -> [0,23,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:55:24 INFO - PROCESS | 3468 | 1477587324762 Marionette TRACE conn5 <- [1,23,null,{"value":null}]
09:55:24 INFO - PROCESS | 3468 | 1477587324779 Marionette TRACE conn5 -> [0,24,"getWindowHandles",null]
09:55:24 INFO - PROCESS | 3468 | 1477587324782 Marionette TRACE conn5 <- [1,24,null,["2147483652"]]
09:55:24 INFO - PROCESS | 3468 | 1477587324787 Marionette TRACE conn5 -> [0,25,"switchToWindow",{"name":"2147483652"}]
09:55:24 INFO - PROCESS | 3468 | 1477587324792 Marionette TRACE conn5 <- [1,25,null,{}]
09:55:24 INFO - PROCESS | 3468 | 1477587324797 Marionette TRACE conn5 -> [0,26,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/hkdf.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker\", \"a2dd4c07-c72f-4f35-a3ec-e382f3c43033\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:55:24 INFO - PROCESS | 3468 | ++DOCSHELL 09041400 == 3 [pid = 3248] [id = 6]
09:55:24 INFO - PROCESS | 3468 | ++DOMWINDOW == 6 (09043800) [pid = 3248] [serial = 18] [outer = 00000000]
09:55:24 INFO - PROCESS | 3468 | ++DOMWINDOW == 7 (0A620400) [pid = 3248] [serial = 19] [outer = 09043800]
09:55:24 INFO - PROCESS | 3468 | [Parent 3468] WARNING: pipe error: 109: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/ipc/chromium/src/chrome/common/ipc_channel_win.cc, line 345
09:55:24 INFO - PROCESS | 3468 | ++DOMWINDOW == 8 (0A627400) [pid = 3248] [serial = 20] [outer = 09043800]
09:55:40 INFO - PROCESS | 3468 | 1477587338943 Marionette TRACE conn5 <- [1,26,null,{"value":["/WebCryptoAPI/derive_bits_keys/hkdf.worker",0,null,null,[["short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["short derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["short derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["long derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["long derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"]]]}]
09:55:40 INFO - .
09:55:40 INFO - PROCESS | 3468 | --DOCSHELL 0889B000 == 2 [pid = 3248] [id = 5]
09:55:41 INFO - ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
09:55:41 INFO - TEST-OK | /WebCryptoAPI/derive_bits_keys/hkdf.worker | took 16575ms
09:55:41 INFO - PROCESS | 3468 | 1477587341242 Marionette TRACE conn5 -> [0,27,"getWindowHandle",null]
09:55:41 INFO - PROCESS | 3468 | 1477587341246 Marionette TRACE conn5 <- [1,27,null,{"value":"2147483652"}]
09:55:41 INFO - PROCESS | 3468 | 1477587341252 Marionette TRACE conn5 -> [0,28,"timeouts",{"script":185000}]
09:55:41 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html
09:55:41 INFO - PROCESS | 3468 | 1477587341255 Marionette TRACE conn5 <- [1,28,null,{}]
09:55:41 INFO - PROCESS | 3468 | 1477587341261 Marionette TRACE conn5 -> [0,29,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:55:41 INFO - PROCESS | 3468 | 1477587341359 Marionette TRACE conn5 <- [1,29,null,{"value":null}]
09:55:41 INFO - PROCESS | 3468 | 1477587341378 Marionette TRACE conn5 -> [0,30,"getWindowHandles",null]
09:55:41 INFO - PROCESS | 3468 | 1477587341382 Marionette TRACE conn5 <- [1,30,null,["2147483652"]]
09:55:41 INFO - PROCESS | 3468 | 1477587341386 Marionette TRACE conn5 -> [0,31,"switchToWindow",{"name":"2147483652"}]
09:55:41 INFO - PROCESS | 3468 | 1477587341392 Marionette TRACE conn5 <- [1,31,null,{}]
09:55:41 INFO - PROCESS | 3468 | 1477587341404 Marionette TRACE conn5 -> [0,32,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html\", \"a2dd4c07-c72f-4f35-a3ec-e382f3c43033\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:55:41 INFO - PROCESS | 3468 | ++DOCSHELL 09043C00 == 3 [pid = 3248] [id = 7]
09:55:41 INFO - PROCESS | 3468 | ++DOMWINDOW == 9 (09047000) [pid = 3248] [serial = 21] [outer = 00000000]
09:55:41 INFO - PROCESS | 3468 | ++DOMWINDOW == 10 (0C72A400) [pid = 3248] [serial = 22] [outer = 09047000]
09:55:41 INFO - PROCESS | 3468 | ++DOMWINDOW == 11 (0C923C00) [pid = 3248] [serial = 23] [outer = 09047000]
09:55:42 INFO - PROCESS | 3468 | --DOMWINDOW == 10 (0889D400) [pid = 3248] [serial = 15] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker]
09:55:44 INFO - PROCESS | 3468 | [Parent 3468] WARNING: pipe error: 109: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/ipc/chromium/src/chrome/common/ipc_channel_win.cc, line 345
09:55:46 INFO - PROCESS | 3468 | --DOCSHELL 09041400 == 2 [pid = 3248] [id = 6]
09:55:46 INFO - PROCESS | 3468 | --DOMWINDOW == 9 (0A620400) [pid = 3248] [serial = 19] [outer = 00000000] [url = about:blank]
09:55:46 INFO - PROCESS | 3468 | --DOMWINDOW == 8 (0A61E400) [pid = 3248] [serial = 17] [outer = 00000000] [url = about:blank]
09:55:48 INFO - PROCESS | 3468 | --DOMWINDOW == 7 (09043800) [pid = 3248] [serial = 18] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker]
09:55:53 INFO - PROCESS | 3468 | --DOMWINDOW == 6 (0A627400) [pid = 3248] [serial = 20] [outer = 00000000] [url = about:blank]
09:55:53 INFO - PROCESS | 3468 | --DOMWINDOW == 5 (0C72A400) [pid = 3248] [serial = 22] [outer = 00000000] [url = about:blank]
09:55:56 INFO - PROCESS | 3468 | ++DOMWINDOW == 15 (1284D800) [pid = 3468] [serial = 24] [outer = 0D154400]
09:56:13 INFO - PROCESS | 3468 | --DOMWINDOW == 14 (0F273C00) [pid = 3468] [serial = 23] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
09:57:26 INFO - PROCESS | 3468 | ++DOMWINDOW == 15 (10237000) [pid = 3468] [serial = 25] [outer = 0D154400]
09:57:40 INFO - PROCESS | 3468 | --DOMWINDOW == 14 (1284D800) [pid = 3468] [serial = 24] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
09:58:41 INFO - PROCESS | 3468 | MARIONETTE LOG: INFO: Timeout fired
09:58:41 INFO - PROCESS | 3468 | 1477587521624 Marionette TRACE conn5 <- [1,32,null,{"value":["/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html",2,null,null,[]]}]
09:58:41 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html | took 180422ms
09:58:41 INFO - PROCESS | 3468 | 1477587521707 Marionette TRACE conn5 -> [0,33,"getWindowHandle",null]
09:58:41 INFO - PROCESS | 3468 | 1477587521713 Marionette TRACE conn5 <- [1,33,null,{"value":"2147483652"}]
09:58:41 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html
09:58:41 INFO - PROCESS | 3468 | 1477587521721 Marionette TRACE conn5 -> [0,34,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
09:58:41 INFO - PROCESS | 3468 | 1477587521886 Marionette TRACE conn5 <- [1,34,null,{"value":null}]
09:58:41 INFO - PROCESS | 3468 | 1477587521907 Marionette TRACE conn5 -> [0,35,"getWindowHandles",null]
09:58:41 INFO - PROCESS | 3468 | 1477587521912 Marionette TRACE conn5 <- [1,35,null,["2147483652"]]
09:58:41 INFO - PROCESS | 3468 | 1477587521919 Marionette TRACE conn5 -> [0,36,"switchToWindow",{"name":"2147483652"}]
09:58:41 INFO - PROCESS | 3468 | 1477587521931 Marionette TRACE conn5 <- [1,36,null,{}]
09:58:41 INFO - PROCESS | 3468 | 1477587521936 Marionette TRACE conn5 -> [0,37,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html\", \"a2dd4c07-c72f-4f35-a3ec-e382f3c43033\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
09:58:41 INFO - PROCESS | 3468 | ++DOCSHELL 0A61F400 == 3 [pid = 3248] [id = 8]
09:58:41 INFO - PROCESS | 3468 | ++DOMWINDOW == 6 (0A61F800) [pid = 3248] [serial = 24] [outer = 00000000]
09:58:42 INFO - PROCESS | 3468 | ++DOMWINDOW == 7 (0A94C000) [pid = 3248] [serial = 25] [outer = 0A61F800]
09:58:42 INFO - PROCESS | 3468 | ++DOMWINDOW == 8 (0C282000) [pid = 3248] [serial = 26] [outer = 0A61F800]
09:58:50 INFO - PROCESS | 3468 | --DOCSHELL 09043C00 == 2 [pid = 3248] [id = 7]
09:58:56 INFO - PROCESS | 3468 | --DOMWINDOW == 7 (09047000) [pid = 3248] [serial = 21] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html]
09:59:00 INFO - PROCESS | 3468 | --DOMWINDOW == 6 (0A94C000) [pid = 3248] [serial = 25] [outer = 00000000] [url = about:blank]
09:59:00 INFO - PROCESS | 3468 | --DOMWINDOW == 5 (0C923C00) [pid = 3248] [serial = 23] [outer = 00000000] [url = about:blank]
09:59:26 INFO - PROCESS | 3468 | ++DOMWINDOW == 15 (118E4400) [pid = 3468] [serial = 26] [outer = 0D154400]
09:59:45 INFO - PROCESS | 3468 | --DOMWINDOW == 14 (10237000) [pid = 3468] [serial = 25] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
10:01:42 INFO - PROCESS | 3468 | MARIONETTE LOG: INFO: Timeout fired
10:01:42 INFO - PROCESS | 3468 | 1477587702168 Marionette TRACE conn5 <- [1,37,null,{"value":["/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html",2,null,null,[]]}]
10:01:42 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html | took 180474ms
10:01:42 INFO - PROCESS | 3468 | 1477587702199 Marionette TRACE conn5 -> [0,38,"getWindowHandle",null]
10:01:42 INFO - PROCESS | 3468 | 1477587702204 Marionette TRACE conn5 <- [1,38,null,{"value":"2147483652"}]
10:01:42 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_hkdf.html
10:01:42 INFO - PROCESS | 3468 | 1477587702238 Marionette TRACE conn5 -> [0,39,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:01:42 INFO - PROCESS | 3468 | 1477587702362 Marionette TRACE conn5 <- [1,39,null,{"value":null}]
10:01:42 INFO - PROCESS | 3468 | 1477587702376 Marionette TRACE conn5 -> [0,40,"getWindowHandles",null]
10:01:42 INFO - PROCESS | 3468 | 1477587702381 Marionette TRACE conn5 <- [1,40,null,["2147483652"]]
10:01:42 INFO - PROCESS | 3468 | 1477587702386 Marionette TRACE conn5 -> [0,41,"switchToWindow",{"name":"2147483652"}]
10:01:42 INFO - PROCESS | 3468 | 1477587702396 Marionette TRACE conn5 <- [1,41,null,{}]
10:01:42 INFO - PROCESS | 3468 | 1477587702401 Marionette TRACE conn5 -> [0,42,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/test_hkdf.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html\", \"a2dd4c07-c72f-4f35-a3ec-e382f3c43033\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:01:42 INFO - PROCESS | 3468 | ++DOCSHELL 09047000 == 3 [pid = 3248] [id = 9]
10:01:42 INFO - PROCESS | 3468 | ++DOMWINDOW == 6 (09049400) [pid = 3248] [serial = 27] [outer = 00000000]
10:01:42 INFO - PROCESS | 3468 | ++DOMWINDOW == 7 (0A94BC00) [pid = 3248] [serial = 28] [outer = 09049400]
10:01:42 INFO - PROCESS | 3468 | ++DOMWINDOW == 8 (0C281C00) [pid = 3248] [serial = 29] [outer = 09049400]
10:01:54 INFO - PROCESS | 3468 | 1477587713572 Marionette TRACE conn5 <- [1,42,null,{"value":["/WebCryptoAPI/derive_bits_keys/test_hkdf.html",0,null,null,[["short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["short derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["short derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["short derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["long derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["long derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"]]]}]
10:01:54 INFO - .
10:01:54 INFO - PROCESS | 3468 | --DOCSHELL 0A61F400 == 2 [pid = 3248] [id = 8]
10:01:55 INFO - ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
10:01:55 INFO - TEST-OK | /WebCryptoAPI/derive_bits_keys/test_hkdf.html | took 13595ms
10:01:55 INFO - PROCESS | 3468 | 1477587715850 Marionette TRACE conn5 -> [0,43,"getWindowHandle",null]
10:01:55 INFO - PROCESS | 3468 | 1477587715854 Marionette TRACE conn5 <- [1,43,null,{"value":"2147483652"}]
10:01:55 INFO - TEST-START | /XMLHttpRequest/FormData-append.html
10:01:55 INFO - PROCESS | 3468 | 1477587715861 Marionette TRACE conn5 -> [0,44,"timeouts",{"script":35000}]
10:01:55 INFO - PROCESS | 3468 | 1477587715863 Marionette TRACE conn5 <- [1,44,null,{}]
10:01:55 INFO - PROCESS | 3468 | 1477587715869 Marionette TRACE conn5 -> [0,45,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:01:55 INFO - PROCESS | 3468 | 1477587715964 Marionette TRACE conn5 <- [1,45,null,{"value":null}]
10:01:55 INFO - PROCESS | 3468 | 1477587715982 Marionette TRACE conn5 -> [0,46,"getWindowHandles",null]
10:01:55 INFO - PROCESS | 3468 | 1477587715986 Marionette TRACE conn5 <- [1,46,null,["2147483652"]]
10:01:55 INFO - PROCESS | 3468 | 1477587715989 Marionette TRACE conn5 -> [0,47,"switchToWindow",{"name":"2147483652"}]
10:01:56 INFO - PROCESS | 3468 | 1477587715996 Marionette TRACE conn5 <- [1,47,null,{}]
10:01:56 INFO - PROCESS | 3468 | 1477587716008 Marionette TRACE conn5 -> [0,48,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/FormData-append.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/FormData-append.html\", \"a2dd4c07-c72f-4f35-a3ec-e382f3c43033\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:01:56 INFO - PROCESS | 3468 | ++DOCSHELL 0A626800 == 3 [pid = 3248] [id = 10]
10:01:56 INFO - PROCESS | 3468 | ++DOMWINDOW == 9 (0A628800) [pid = 3248] [serial = 30] [outer = 00000000]
10:01:56 INFO - PROCESS | 3468 | ++DOMWINDOW == 10 (0BE15400) [pid = 3248] [serial = 31] [outer = 0A628800]
10:01:56 INFO - PROCESS | 3468 | ++DOMWINDOW == 11 (0BE19000) [pid = 3248] [serial = 32] [outer = 0A628800]
10:01:56 INFO - PROCESS | 3468 | --DOCSHELL 0D14A000 == 6 [pid = 3468] [id = 8]
10:01:56 INFO - PROCESS | 3468 | --DOMWINDOW == 10 (0A61F800) [pid = 3248] [serial = 24] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html]
10:01:56 INFO - PROCESS | 3468 | 1477587716466 Marionette TRACE conn5 <- [1,48,null,{"value":["/XMLHttpRequest/FormData-append.html",0,null,null,[["Passing a String object to FormData.append should work.",0,null,null],["testFormDataAppend1",0,null,null],["testFormDataAppend2",0,null,null],["testFormDataAppendUndefined1",0,null,null],["testFormDataAppendUndefined2",0,null,null],["testFormDataAppendNull1",0,null,null],["testFormDataAppendNull2",0,null,null],["testFormDataAppendToForm1",0,null,null],["testFormDataAppendToForm2",0,null,null],["testFormDataAppendToFormUndefined1",0,null,null],["testFormDataAppendToFormUndefined2",0,null,null],["testFormDataAppendToFormNull1",0,null,null],["testFormDataAppendToFormNull2",0,null,null],["testFormDataAppendEmptyBlob",0,null,null]]]}]
10:01:56 INFO - ..............
10:01:56 INFO - TEST-OK | /XMLHttpRequest/FormData-append.html | took 631ms
10:01:56 INFO - PROCESS | 3468 | 1477587716496 Marionette TRACE conn5 -> [0,49,"getWindowHandle",null]
10:01:56 INFO - PROCESS | 3468 | 1477587716498 Marionette TRACE conn5 <- [1,49,null,{"value":"2147483652"}]
10:01:56 INFO - TEST-START | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.html
10:01:56 INFO - PROCESS | 3468 | 1477587716503 Marionette TRACE conn5 -> [0,50,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:01:56 INFO - PROCESS | 3468 | 1477587716594 Marionette TRACE conn5 <- [1,50,null,{"value":null}]
10:01:56 INFO - PROCESS | 3468 | 1477587716614 Marionette TRACE conn5 -> [0,51,"getWindowHandles",null]
10:01:56 INFO - PROCESS | 3468 | 1477587716617 Marionette TRACE conn5 <- [1,51,null,["2147483652"]]
10:01:56 INFO - PROCESS | 3468 | 1477587716621 Marionette TRACE conn5 -> [0,52,"switchToWindow",{"name":"2147483652"}]
10:01:56 INFO - PROCESS | 3468 | 1477587716626 Marionette TRACE conn5 <- [1,52,null,{}]
10:01:56 INFO - PROCESS | 3468 | 1477587716629 Marionette TRACE conn5 -> [0,53,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html\", \"a2dd4c07-c72f-4f35-a3ec-e382f3c43033\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:01:56 INFO - PROCESS | 3468 | ++DOCSHELL 0BE1A000 == 4 [pid = 3248] [id = 11]
10:01:56 INFO - PROCESS | 3468 | ++DOMWINDOW == 11 (0BE1B800) [pid = 3248] [serial = 33] [outer = 00000000]
10:01:56 INFO - PROCESS | 3468 | ++DOMWINDOW == 12 (0D724800) [pid = 3248] [serial = 34] [outer = 0BE1B800]
10:01:56 INFO - PROCESS | 3468 | ++DOMWINDOW == 13 (0D727800) [pid = 3248] [serial = 35] [outer = 0BE1B800]
10:01:58 INFO - PROCESS | 3468 | 1477587718074 Marionette TRACE conn5 <- [1,53,null,{"value":["/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html",0,null,null,[["default value is false, set value is true",0,null,null],["can also be set in OPEN state",0,null,null],["setting on synchronous XHR",0,null,null],["setting withCredentials when not in UNSENT, OPENED state (asynchronous)",0,null,null],["setting withCredentials when in DONE state (synchronous)",0,null,null]]]}]
10:01:58 INFO - .....
10:01:58 INFO - TEST-OK | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.html | took 1614ms
10:01:58 INFO - PROCESS | 3468 | 1477587718121 Marionette TRACE conn5 -> [0,54,"getWindowHandle",null]
10:01:58 INFO - PROCESS | 3468 | 1477587718124 Marionette TRACE conn5 <- [1,54,null,{"value":"2147483652"}]
10:01:58 INFO - TEST-START | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker
10:01:58 INFO - PROCESS | 3468 | 1477587718128 Marionette TRACE conn5 -> [0,55,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:01:58 INFO - PROCESS | 3468 | 1477587718208 Marionette TRACE conn5 <- [1,55,null,{"value":null}]
10:01:58 INFO - PROCESS | 3468 | 1477587718230 Marionette TRACE conn5 -> [0,56,"getWindowHandles",null]
10:01:58 INFO - PROCESS | 3468 | 1477587718232 Marionette TRACE conn5 <- [1,56,null,["2147483652"]]
10:01:58 INFO - PROCESS | 3468 | 1477587718236 Marionette TRACE conn5 -> [0,57,"switchToWindow",{"name":"2147483652"}]
10:01:58 INFO - PROCESS | 3468 | 1477587718241 Marionette TRACE conn5 <- [1,57,null,{}]
10:01:58 INFO - PROCESS | 3468 | 1477587718244 Marionette TRACE conn5 -> [0,58,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker\", \"a2dd4c07-c72f-4f35-a3ec-e382f3c43033\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:01:58 INFO - PROCESS | 3468 | ++DOCSHELL 1012EC00 == 5 [pid = 3248] [id = 12]
10:01:58 INFO - PROCESS | 3468 | ++DOMWINDOW == 14 (0A626C00) [pid = 3248] [serial = 36] [outer = 00000000]
10:01:58 INFO - PROCESS | 3468 | ++DOMWINDOW == 15 (10134800) [pid = 3248] [serial = 37] [outer = 0A626C00]
10:01:58 INFO - PROCESS | 3468 | ++DOMWINDOW == 16 (10136800) [pid = 3248] [serial = 38] [outer = 0A626C00]
10:02:01 INFO - PROCESS | 3468 | --DOCSHELL 0BE1A000 == 4 [pid = 3248] [id = 11]
10:02:01 INFO - PROCESS | 3468 | --DOCSHELL 0A626800 == 3 [pid = 3248] [id = 10]
10:02:01 INFO - PROCESS | 3468 | --DOCSHELL 09047000 == 2 [pid = 3248] [id = 9]
10:02:01 INFO - PROCESS | 3468 | --DOMWINDOW == 15 (0C282000) [pid = 3248] [serial = 26] [outer = 00000000] [url = about:blank]
10:02:01 INFO - PROCESS | 3468 | --DOMWINDOW == 14 (0A94BC00) [pid = 3248] [serial = 28] [outer = 00000000] [url = about:blank]
10:02:04 INFO - PROCESS | 3468 | --DOMWINDOW == 13 (0A628800) [pid = 3248] [serial = 30] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/FormData-append.html]
10:02:04 INFO - PROCESS | 3468 | --DOMWINDOW == 12 (0BE1B800) [pid = 3248] [serial = 33] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html]
10:02:04 INFO - PROCESS | 3468 | --DOMWINDOW == 11 (09049400) [pid = 3248] [serial = 27] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html]
10:02:06 INFO - PROCESS | 3468 | --DOCSHELL 0D151C00 == 5 [pid = 3468] [id = 9]
10:02:08 INFO - PROCESS | 3468 | --DOMWINDOW == 10 (0C281C00) [pid = 3248] [serial = 29] [outer = 00000000] [url = about:blank]
10:02:08 INFO - PROCESS | 3468 | --DOMWINDOW == 9 (0BE19000) [pid = 3248] [serial = 32] [outer = 00000000] [url = about:blank]
10:02:08 INFO - PROCESS | 3468 | --DOMWINDOW == 8 (0BE15400) [pid = 3248] [serial = 31] [outer = 00000000] [url = about:blank]
10:02:08 INFO - PROCESS | 3468 | --DOMWINDOW == 7 (0D727800) [pid = 3248] [serial = 35] [outer = 00000000] [url = about:blank]
10:02:08 INFO - PROCESS | 3468 | --DOMWINDOW == 6 (0D724800) [pid = 3248] [serial = 34] [outer = 00000000] [url = about:blank]
10:02:08 INFO - PROCESS | 3468 | --DOMWINDOW == 5 (10134800) [pid = 3248] [serial = 37] [outer = 00000000] [url = about:blank]
10:02:08 INFO - PROCESS | 3468 | --DOMWINDOW == 13 (0D154400) [pid = 3468] [serial = 20] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
10:02:08 INFO - PROCESS | 3468 | --DOMWINDOW == 12 (0D14A800) [pid = 3468] [serial = 17] [outer = 00000000] [url = data:application/vnd.mozilla.xul+xml;charset=utf-8,]
10:02:13 INFO - PROCESS | 3468 | --DOMWINDOW == 11 (0D1B0800) [pid = 3468] [serial = 19] [outer = 00000000] [url = data:application/vnd.mozilla.xul+xml;charset=utf-8,]
10:02:13 INFO - PROCESS | 3468 | --DOMWINDOW == 10 (118E4400) [pid = 3468] [serial = 26] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
10:02:28 INFO - PROCESS | 3468 | MARIONETTE LOG: INFO: Timeout fired
10:02:28 INFO - PROCESS | 3468 | JavaScript error: executormarionette.py, line 33: TypeError: window.wrappedJSObject.win.timeout is not a function
10:02:33 INFO - PROCESS | 3468 | 1477587753272 Marionette TRACE conn5 <- [1,58,{"error":"script timeout","message":"Timed out","stacktrace":""},null]
10:02:33 INFO - TEST-TIMEOUT | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker | took 35162ms
10:02:33 WARNING - u'runner_teardown' ()
10:02:33 INFO - Setting up ssl
10:02:34 INFO - PROCESS | certutil |
10:02:34 INFO - PROCESS | certutil |
10:02:34 INFO - PROCESS | certutil |
10:02:34 INFO - Certificate Nickname Trust Attributes
10:02:34 INFO - SSL,S/MIME,JAR/XPI
10:02:34 INFO -
10:02:34 INFO - web-platform-tests CT,,
10:02:34 INFO -
10:02:34 INFO - Application command: c:\slave\test\build\application\firefox\firefox.exe -marionette about:blank -profile c:\users\cltbld\appdata\local\temp\tmpj4mbfo.mozrunner
10:02:34 INFO - Starting runner
10:02:34 INFO - PROCESS | 5544 | [5544] WARNING: Failed to load startupcache file correctly, removing!: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/startupcache/StartupCache.cpp, line 219
10:02:34 INFO - PROCESS | 5544 | [5544] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80004005: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpcom/base/nsSystemInfo.cpp, line 116
10:02:35 INFO - PROCESS | 5544 | [5544] WARNING: This method is lossy. Use GetCanonicalPath !: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpcom/io/nsLocalFileWin.cpp, line 3579
10:02:36 INFO - PROCESS | 5544 | 1477587756562 Marionette DEBUG Marionette enabled via build flag and pref
10:02:37 INFO - PROCESS | 5544 | ++DOCSHELL 0F5F7400 == 1 [pid = 5544] [id = 1]
10:02:37 INFO - PROCESS | 5544 | ++DOMWINDOW == 1 (0F5F7800) [pid = 5544] [serial = 1] [outer = 00000000]
10:02:37 INFO - PROCESS | 5544 | ++DOMWINDOW == 2 (0F5F8400) [pid = 5544] [serial = 2] [outer = 0F5F7800]
10:02:37 INFO - PROCESS | 5544 | [5544] WARNING: DWM not enabled, falling back to software vsync: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/gfx/thebes/gfxWindowsPlatform.cpp, line 1971
10:02:37 INFO - PROCESS | 5544 | ++DOCSHELL 0F59B800 == 2 [pid = 5544] [id = 2]
10:02:37 INFO - PROCESS | 5544 | ++DOMWINDOW == 3 (0F59BC00) [pid = 5544] [serial = 3] [outer = 00000000]
10:02:37 INFO - PROCESS | 5544 | ++DOMWINDOW == 4 (0F59C800) [pid = 5544] [serial = 4] [outer = 0F59BC00]
10:02:37 INFO - PROCESS | 5544 | 1477587757835 Marionette INFO Listening on port 2829
10:02:39 INFO - PROCESS | 5544 | 1477587759430 Marionette DEBUG Marionette enabled via command-line flag
10:02:39 INFO - PROCESS | 5544 | [5544] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
10:02:39 INFO - PROCESS | 5544 | [5544] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
10:02:39 INFO - PROCESS | 5544 | [5544] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
10:02:39 INFO - PROCESS | 5544 | [5544] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
10:02:39 INFO - PROCESS | 5544 | ++DOCSHELL 12191000 == 3 [pid = 5544] [id = 3]
10:02:39 INFO - PROCESS | 5544 | ++DOMWINDOW == 5 (12191400) [pid = 5544] [serial = 5] [outer = 00000000]
10:02:39 INFO - PROCESS | 5544 | ++DOMWINDOW == 6 (12192000) [pid = 5544] [serial = 6] [outer = 12191400]
10:02:39 INFO - PROCESS | 5544 | ++DOMWINDOW == 7 (12B36800) [pid = 5544] [serial = 7] [outer = 0F59BC00]
10:02:39 INFO - PROCESS | 5544 | 1477587759675 Marionette DEBUG Accepted connection conn0 from 127.0.0.1:49500
10:02:39 INFO - PROCESS | 5544 | 1477587759694 Marionette DEBUG Accepted connection conn1 from 127.0.0.1:49501
10:02:39 INFO - PROCESS | 5544 | 1477587759702 Marionette DEBUG Accepted connection conn2 from 127.0.0.1:49502
10:02:39 INFO - PROCESS | 5544 | 1477587759733 Marionette DEBUG Closed connection conn0
10:02:39 INFO - PROCESS | 5544 | 1477587759735 Marionette DEBUG Closed connection conn1
10:02:39 INFO - PROCESS | 5544 | 1477587759805 Marionette DEBUG Closed connection conn2
10:02:39 INFO - PROCESS | 5544 | 1477587759929 Marionette DEBUG Accepted connection conn3 from 127.0.0.1:49505
10:02:39 INFO - PROCESS | 5544 | 1477587759943 Marionette DEBUG Closed connection conn3
10:02:39 INFO - PROCESS | 5544 | 1477587759948 Marionette DEBUG Accepted connection conn4 from 127.0.0.1:49506
10:02:39 INFO - PROCESS | 5544 | 1477587759952 Marionette DEBUG Closed connection conn4
10:02:39 INFO - PROCESS | 5544 | 1477587759958 Marionette DEBUG Accepted connection conn5 from 127.0.0.1:49507
10:02:39 INFO - PROCESS | 5544 | 1477587759970 Marionette TRACE conn5 -> [0,1,"newSession",{"sessionId":null,"capabilities":null}]
10:02:39 INFO - PROCESS | 5544 | 1477587759975 Marionette CONFIG Changing capabilities: {"browserName":"firefox","browserVersion":"52.0a1","platformName":"windows_nt","platformVersion":"6.1","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20161027075434","processId":5544,"version":"52.0a1"}
10:02:40 INFO - PROCESS | 5544 | [Child 5820] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80004005: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/toolkit/xre/nsXREDirProvider.cpp, line 1703
10:02:40 INFO - PROCESS | 5544 | [Child 5820] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80004005: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpcom/base/nsSystemInfo.cpp, line 116
10:02:40 INFO - PROCESS | 5544 | [Parent 5544] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1553
10:02:40 INFO - PROCESS | 5544 | [Parent 5544] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1553
10:02:40 INFO - PROCESS | 5544 | [Parent 5544] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
10:02:40 INFO - PROCESS | 5544 | ++DOCSHELL 08F45C00 == 1 [pid = 5820] [id = 1]
10:02:40 INFO - PROCESS | 5544 | ++DOMWINDOW == 1 (08F46000) [pid = 5820] [serial = 1] [outer = 00000000]
10:02:40 INFO - PROCESS | 5544 | ++DOMWINDOW == 2 (08FD6000) [pid = 5820] [serial = 2] [outer = 08F46000]
10:02:40 INFO - PROCESS | 5544 | ++DOMWINDOW == 3 (08FDB800) [pid = 5820] [serial = 3] [outer = 08F46000]
10:02:40 INFO - PROCESS | 5544 | ++DOCSHELL 15153800 == 4 [pid = 5544] [id = 4]
10:02:40 INFO - PROCESS | 5544 | ++DOMWINDOW == 8 (15153C00) [pid = 5544] [serial = 8] [outer = 00000000]
10:02:40 INFO - PROCESS | 5544 | ++DOCSHELL 15154400 == 5 [pid = 5544] [id = 5]
10:02:40 INFO - PROCESS | 5544 | ++DOMWINDOW == 9 (15154800) [pid = 5544] [serial = 9] [outer = 00000000]
10:02:41 INFO - PROCESS | 5544 | ++DOCSHELL 166BA800 == 6 [pid = 5544] [id = 6]
10:02:41 INFO - PROCESS | 5544 | ++DOMWINDOW == 10 (166BAC00) [pid = 5544] [serial = 10] [outer = 00000000]
10:02:41 INFO - PROCESS | 5544 | ++DOMWINDOW == 11 (166C4800) [pid = 5544] [serial = 11] [outer = 166BAC00]
10:02:41 INFO - PROCESS | 5544 | ++DOCSHELL 0A99A800 == 2 [pid = 5820] [id = 2]
10:02:41 INFO - PROCESS | 5544 | ++DOMWINDOW == 4 (0A99AC00) [pid = 5820] [serial = 4] [outer = 00000000]
10:02:41 INFO - PROCESS | 5544 | ++DOMWINDOW == 12 (16DC2C00) [pid = 5544] [serial = 12] [outer = 15153C00]
10:02:41 INFO - PROCESS | 5544 | ++DOMWINDOW == 13 (17102000) [pid = 5544] [serial = 13] [outer = 15154800]
10:02:41 INFO - PROCESS | 5544 | [Parent 5544] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
10:02:41 INFO - PROCESS | 5544 | [Parent 5544] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
10:02:41 INFO - PROCESS | 5544 | ++DOMWINDOW == 5 (0AC1E400) [pid = 5820] [serial = 5] [outer = 0A99AC00]
10:02:41 INFO - PROCESS | 5544 | ++DOMWINDOW == 6 (0A999C00) [pid = 5820] [serial = 6] [outer = 0A99AC00]
10:02:42 INFO - PROCESS | 5544 | ++DOMWINDOW == 7 (0C922800) [pid = 5820] [serial = 7] [outer = 0A99AC00]
10:02:43 INFO - PROCESS | 5544 | 1477587763363 Marionette TRACE conn5 <- [1,1,null,{"sessionId":"daad641e-43bf-4e13-a2f8-39913ecc17a3","capabilities":{"browserName":"firefox","browserVersion":"52.0a1","platformName":"windows_nt","platformVersion":"6.1","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20161027075434","processId":5544,"version":"52.0a1","command_id":1}}]
10:02:43 INFO - PROCESS | 5544 | 1477587763468 Marionette TRACE conn5 -> [0,2,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":137}]
10:02:43 INFO - PROCESS | 5544 | 1477587763723 Marionette TRACE conn5 <- [1,2,null,{"value":null}]
10:02:43 INFO - PROCESS | 5544 | 1477587763749 Marionette TRACE conn5 -> [0,3,"getWindowHandle",null]
10:02:43 INFO - PROCESS | 5544 | 1477587763754 Marionette TRACE conn5 <- [1,3,null,{"value":"2147483652"}]
10:02:43 INFO - PROCESS | 5544 | 1477587763769 Marionette TRACE conn5 -> [0,4,"get",{"url":"http://web-platform.test:8000/testharness_runner.html"}]
10:02:43 INFO - PROCESS | 5544 | [Child 5820] WARNING: site security information will not be persisted: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/security/manager/ssl/nsSiteSecurityService.cpp, line 268
10:02:43 INFO - PROCESS | 5544 | [Parent 5544] WARNING: Could not get disk status from nsIDiskSpaceWatcher: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/uriloader/prefetch/nsOfflineCacheUpdateService.cpp, line 283
10:02:44 INFO - PROCESS | 5544 | ++DOMWINDOW == 8 (0CC12000) [pid = 5820] [serial = 8] [outer = 0A99AC00]
10:02:44 INFO - PROCESS | 5544 | 1477587764493 Marionette TRACE conn5 <- [1,4,null,{}]
10:02:44 INFO - PROCESS | 5544 | 1477587764515 Marionette TRACE conn5 -> [0,5,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"document.title = 'MainThread'","sandbox":"default","line":150}]
10:02:44 INFO - PROCESS | 5544 | 1477587764581 Marionette TRACE conn5 <- [1,5,null,{"value":null}]
10:02:44 INFO - PROCESS | 5544 | 1477587764594 Marionette TRACE conn5 -> [0,6,"getWindowHandle",null]
10:02:44 INFO - PROCESS | 5544 | 1477587764598 Marionette TRACE conn5 <- [1,6,null,{"value":"2147483652"}]
10:02:44 INFO - TEST-START | /XMLHttpRequest/abort-after-receive.htm
10:02:44 INFO - PROCESS | 5544 | 1477587764602 Marionette TRACE conn5 -> [0,7,"timeouts",{"script":35000}]
10:02:44 INFO - PROCESS | 5544 | 1477587764604 Marionette TRACE conn5 <- [1,7,null,{}]
10:02:44 INFO - PROCESS | 5544 | 1477587764610 Marionette TRACE conn5 -> [0,8,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:02:44 INFO - PROCESS | 5544 | 1477587764634 Marionette TRACE conn5 <- [1,8,null,{"value":null}]
10:02:44 INFO - PROCESS | 5544 | 1477587764637 Marionette TRACE conn5 -> [0,9,"getWindowHandles",null]
10:02:44 INFO - PROCESS | 5544 | 1477587764639 Marionette TRACE conn5 <- [1,9,null,["2147483652"]]
10:02:44 INFO - PROCESS | 5544 | 1477587764643 Marionette TRACE conn5 -> [0,10,"switchToWindow",{"name":"2147483652"}]
10:02:44 INFO - PROCESS | 5544 | 1477587764646 Marionette TRACE conn5 <- [1,10,null,{}]
10:02:44 INFO - PROCESS | 5544 | 1477587764656 Marionette TRACE conn5 -> [0,11,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-receive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-receive.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:02:44 INFO - PROCESS | 5544 | ++DOCSHELL 0D412C00 == 3 [pid = 5820] [id = 3]
10:02:44 INFO - PROCESS | 5544 | ++DOMWINDOW == 9 (0D413000) [pid = 5820] [serial = 9] [outer = 00000000]
10:02:44 INFO - PROCESS | 5544 | ++DOMWINDOW == 10 (0D4DDC00) [pid = 5820] [serial = 10] [outer = 0D413000]
10:02:44 INFO - PROCESS | 5544 | ++DOMWINDOW == 11 (0D4E0400) [pid = 5820] [serial = 11] [outer = 0D413000]
10:02:44 INFO - PROCESS | 5544 | ++DOCSHELL 1B081400 == 7 [pid = 5544] [id = 7]
10:02:44 INFO - PROCESS | 5544 | ++DOMWINDOW == 14 (1B081800) [pid = 5544] [serial = 14] [outer = 00000000]
10:02:44 INFO - PROCESS | 5544 | ++DOMWINDOW == 15 (1B08A000) [pid = 5544] [serial = 15] [outer = 1B081800]
10:02:44 INFO - PROCESS | 5544 | 1477587764929 Marionette DEBUG loaded listener.js
10:02:45 INFO - PROCESS | 5544 | ++DOMWINDOW == 16 (1B3AC800) [pid = 5544] [serial = 16] [outer = 1B081800]
10:02:45 INFO - PROCESS | 5544 | 1477587765721 Marionette TRACE conn5 <- [1,11,null,{"value":["/XMLHttpRequest/abort-after-receive.htm",0,null,null,[["XMLHttpRequest: abort() after successful receive should not fire \"abort\" event",0,null,null]]]}]
10:02:45 INFO - .
10:02:45 INFO - TEST-OK | /XMLHttpRequest/abort-after-receive.htm | took 1170ms
10:02:45 INFO - PROCESS | 5544 | 1477587765775 Marionette TRACE conn5 -> [0,12,"getWindowHandle",null]
10:02:45 INFO - PROCESS | 5544 | 1477587765778 Marionette TRACE conn5 <- [1,12,null,{"value":"2147483652"}]
10:02:45 INFO - PROCESS | 5544 | 1477587765782 Marionette TRACE conn5 -> [0,13,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:02:45 INFO - TEST-START | /XMLHttpRequest/abort-after-send.htm
10:02:45 INFO - PROCESS | 5544 | 1477587765867 Marionette TRACE conn5 <- [1,13,null,{"value":null}]
10:02:45 INFO - PROCESS | 5544 | 1477587765890 Marionette TRACE conn5 -> [0,14,"getWindowHandles",null]
10:02:45 INFO - PROCESS | 5544 | 1477587765893 Marionette TRACE conn5 <- [1,14,null,["2147483652"]]
10:02:45 INFO - PROCESS | 5544 | 1477587765897 Marionette TRACE conn5 -> [0,15,"switchToWindow",{"name":"2147483652"}]
10:02:45 INFO - PROCESS | 5544 | 1477587765900 Marionette TRACE conn5 <- [1,15,null,{}]
10:02:45 INFO - PROCESS | 5544 | 1477587765904 Marionette TRACE conn5 -> [0,16,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-send.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:02:45 INFO - PROCESS | 5544 | ++DOCSHELL 0D735800 == 4 [pid = 5820] [id = 4]
10:02:45 INFO - PROCESS | 5544 | ++DOMWINDOW == 12 (0D736400) [pid = 5820] [serial = 12] [outer = 00000000]
10:02:45 INFO - PROCESS | 5544 | ++DOMWINDOW == 13 (0D7AA000) [pid = 5820] [serial = 13] [outer = 0D736400]
10:02:46 INFO - PROCESS | 5544 | ++DOMWINDOW == 14 (0D7AC800) [pid = 5820] [serial = 14] [outer = 0D736400]
10:02:46 INFO - PROCESS | 5544 | 1477587766313 Marionette TRACE conn5 <- [1,16,null,{"value":["/XMLHttpRequest/abort-after-send.htm",0,null,null,[["XMLHttpRequest: abort() after send()",0,null,null]]]}]
10:02:46 INFO - .
10:02:46 INFO - TEST-OK | /XMLHttpRequest/abort-after-send.htm | took 570ms
10:02:46 INFO - PROCESS | 5544 | 1477587766355 Marionette TRACE conn5 -> [0,17,"getWindowHandle",null]
10:02:46 INFO - PROCESS | 5544 | 1477587766358 Marionette TRACE conn5 <- [1,17,null,{"value":"2147483652"}]
10:02:46 INFO - TEST-START | /XMLHttpRequest/abort-after-stop.htm
10:02:46 INFO - PROCESS | 5544 | 1477587766362 Marionette TRACE conn5 -> [0,18,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:02:46 INFO - PROCESS | 5544 | 1477587766440 Marionette TRACE conn5 <- [1,18,null,{"value":null}]
10:02:46 INFO - PROCESS | 5544 | 1477587766454 Marionette TRACE conn5 -> [0,19,"getWindowHandles",null]
10:02:46 INFO - PROCESS | 5544 | 1477587766457 Marionette TRACE conn5 <- [1,19,null,["2147483652"]]
10:02:46 INFO - PROCESS | 5544 | 1477587766461 Marionette TRACE conn5 -> [0,20,"switchToWindow",{"name":"2147483652"}]
10:02:46 INFO - PROCESS | 5544 | 1477587766465 Marionette TRACE conn5 <- [1,20,null,{}]
10:02:46 INFO - PROCESS | 5544 | 1477587766469 Marionette TRACE conn5 -> [0,21,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-stop.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:02:46 INFO - PROCESS | 5544 | ++DOCSHELL 0D735C00 == 5 [pid = 5820] [id = 5]
10:02:46 INFO - PROCESS | 5544 | ++DOMWINDOW == 15 (0D7B0C00) [pid = 5820] [serial = 15] [outer = 00000000]
10:02:46 INFO - PROCESS | 5544 | ++DOMWINDOW == 16 (0D91E400) [pid = 5820] [serial = 16] [outer = 0D7B0C00]
10:02:46 INFO - PROCESS | 5544 | ++DOMWINDOW == 17 (0D922400) [pid = 5820] [serial = 17] [outer = 0D7B0C00]
10:02:47 INFO - PROCESS | 5544 | --DOCSHELL 0F5F7400 == 6 [pid = 5544] [id = 1]
10:02:48 INFO - PROCESS | 5544 | ++DOCSHELL 0E344000 == 7 [pid = 5544] [id = 8]
10:02:48 INFO - PROCESS | 5544 | ++DOMWINDOW == 17 (0E344400) [pid = 5544] [serial = 17] [outer = 00000000]
10:02:48 INFO - PROCESS | 5544 | ++DOMWINDOW == 18 (0E34A000) [pid = 5544] [serial = 18] [outer = 0E344400]
10:02:48 INFO - PROCESS | 5544 | ++DOMWINDOW == 19 (0E653000) [pid = 5544] [serial = 19] [outer = 0E344400]
10:02:48 INFO - PROCESS | 5544 | ++DOCSHELL 0E3C4400 == 8 [pid = 5544] [id = 9]
10:02:48 INFO - PROCESS | 5544 | ++DOMWINDOW == 20 (0E880800) [pid = 5544] [serial = 20] [outer = 00000000]
10:02:48 INFO - PROCESS | 5544 | ++DOMWINDOW == 21 (0F377400) [pid = 5544] [serial = 21] [outer = 0E880800]
10:02:48 INFO - PROCESS | 5544 | ++DOMWINDOW == 22 (0F52F400) [pid = 5544] [serial = 22] [outer = 0E880800]
10:02:49 INFO - PROCESS | 5544 | --DOCSHELL 166BA800 == 7 [pid = 5544] [id = 6]
10:02:51 INFO - PROCESS | 5544 | --DOCSHELL 0D735800 == 4 [pid = 5820] [id = 4]
10:02:51 INFO - PROCESS | 5544 | --DOCSHELL 0D412C00 == 3 [pid = 5820] [id = 3]
10:02:51 INFO - PROCESS | 5544 | --DOCSHELL 08F45C00 == 2 [pid = 5820] [id = 1]
10:02:56 INFO - PROCESS | 5544 | --DOMWINDOW == 21 (166BAC00) [pid = 5544] [serial = 10] [outer = 00000000] [url = about:blank]
10:02:56 INFO - PROCESS | 5544 | --DOMWINDOW == 20 (0F5F7800) [pid = 5544] [serial = 1] [outer = 00000000] [url = chrome://gfxsanity/content/sanityparent.html]
10:02:58 INFO - PROCESS | 5544 | --DOMWINDOW == 16 (08F46000) [pid = 5820] [serial = 1] [outer = 00000000] [url = chrome://gfxsanity/content/sanitytest.html]
10:02:58 INFO - PROCESS | 5544 | --DOMWINDOW == 15 (0D413000) [pid = 5820] [serial = 9] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-receive.htm]
10:02:58 INFO - PROCESS | 5544 | --DOMWINDOW == 14 (0D736400) [pid = 5820] [serial = 12] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-send.htm]
10:03:00 INFO - PROCESS | 5544 | --DOMWINDOW == 19 (1B08A000) [pid = 5544] [serial = 15] [outer = 00000000] [url = about:blank]
10:03:00 INFO - PROCESS | 5544 | --DOMWINDOW == 18 (166C4800) [pid = 5544] [serial = 11] [outer = 00000000] [url = about:blank]
10:03:00 INFO - PROCESS | 5544 | --DOMWINDOW == 17 (0F5F8400) [pid = 5544] [serial = 2] [outer = 00000000] [url = about:blank]
10:03:00 INFO - PROCESS | 5544 | --DOMWINDOW == 16 (0F59C800) [pid = 5544] [serial = 4] [outer = 00000000] [url = about:blank]
10:03:00 INFO - PROCESS | 5544 | --DOMWINDOW == 15 (0F377400) [pid = 5544] [serial = 21] [outer = 00000000] [url = about:blank]
10:03:00 INFO - PROCESS | 5544 | --DOMWINDOW == 14 (0E34A000) [pid = 5544] [serial = 18] [outer = 00000000] [url = about:blank]
10:03:02 INFO - PROCESS | 5544 | --DOMWINDOW == 13 (08FD6000) [pid = 5820] [serial = 2] [outer = 00000000] [url = about:blank]
10:03:02 INFO - PROCESS | 5544 | --DOMWINDOW == 12 (08FDB800) [pid = 5820] [serial = 3] [outer = 00000000] [url = chrome://gfxsanity/content/sanitytest.html]
10:03:02 INFO - PROCESS | 5544 | --DOMWINDOW == 11 (0AC1E400) [pid = 5820] [serial = 5] [outer = 00000000] [url = about:blank]
10:03:02 INFO - PROCESS | 5544 | --DOMWINDOW == 10 (0D91E400) [pid = 5820] [serial = 16] [outer = 00000000] [url = about:blank]
10:03:02 INFO - PROCESS | 5544 | --DOMWINDOW == 9 (0D7AA000) [pid = 5820] [serial = 13] [outer = 00000000] [url = about:blank]
10:03:02 INFO - PROCESS | 5544 | --DOMWINDOW == 8 (0D7AC800) [pid = 5820] [serial = 14] [outer = 00000000] [url = about:blank]
10:03:02 INFO - PROCESS | 5544 | --DOMWINDOW == 7 (0D4DDC00) [pid = 5820] [serial = 10] [outer = 00000000] [url = about:blank]
10:03:02 INFO - PROCESS | 5544 | --DOMWINDOW == 6 (0D4E0400) [pid = 5820] [serial = 11] [outer = 00000000] [url = about:blank]
10:03:08 INFO - PROCESS | 5544 | --DOMWINDOW == 5 (0A999C00) [pid = 5820] [serial = 6] [outer = 00000000] [url = about:blank]
10:03:16 INFO - PROCESS | 5544 | MARIONETTE LOG: INFO: Timeout fired
10:03:16 INFO - PROCESS | 5544 | 1477587796682 Marionette TRACE conn5 <- [1,21,null,{"value":["/XMLHttpRequest/abort-after-stop.htm",2,null,null,[["XMLHttpRequest: abort event should fire when stop() method is used",1,"assert_equals: expected true but got false","@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:24:13\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\n@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:23:11\nsetTimeout handler*@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:22:9\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\n@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:13:7\n"]]]}]
10:03:16 INFO - .
10:03:16 INFO - TEST-TIMEOUT | /XMLHttpRequest/abort-after-stop.htm | took 30384ms
10:03:16 INFO - PROCESS | 5544 | 1477587796750 Marionette TRACE conn5 -> [0,22,"getWindowHandle",null]
10:03:16 INFO - PROCESS | 5544 | 1477587796756 Marionette TRACE conn5 <- [1,22,null,{"value":"2147483652"}]
10:03:16 INFO - TEST-START | /XMLHttpRequest/abort-after-timeout.htm
10:03:16 INFO - PROCESS | 5544 | 1477587796763 Marionette TRACE conn5 -> [0,23,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:16 INFO - PROCESS | 5544 | 1477587796879 Marionette TRACE conn5 <- [1,23,null,{"value":null}]
10:03:16 INFO - PROCESS | 5544 | 1477587796897 Marionette TRACE conn5 -> [0,24,"getWindowHandles",null]
10:03:16 INFO - PROCESS | 5544 | 1477587796900 Marionette TRACE conn5 <- [1,24,null,["2147483652"]]
10:03:16 INFO - PROCESS | 5544 | 1477587796905 Marionette TRACE conn5 -> [0,25,"switchToWindow",{"name":"2147483652"}]
10:03:16 INFO - PROCESS | 5544 | 1477587796912 Marionette TRACE conn5 <- [1,25,null,{}]
10:03:16 INFO - PROCESS | 5544 | 1477587796917 Marionette TRACE conn5 -> [0,26,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-timeout.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-timeout.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:16 INFO - PROCESS | 5544 | ++DOCSHELL 0879B000 == 3 [pid = 5820] [id = 6]
10:03:16 INFO - PROCESS | 5544 | ++DOMWINDOW == 6 (0879D400) [pid = 5820] [serial = 18] [outer = 00000000]
10:03:17 INFO - PROCESS | 5544 | ++DOMWINDOW == 7 (08F42800) [pid = 5820] [serial = 19] [outer = 0879D400]
10:03:17 INFO - PROCESS | 5544 | ++DOMWINDOW == 8 (08FD5400) [pid = 5820] [serial = 20] [outer = 0879D400]
10:03:17 INFO - PROCESS | 5544 | 1477587797624 Marionette TRACE conn5 <- [1,26,null,{"value":["/XMLHttpRequest/abort-after-timeout.htm",0,null,null,[["XMLHttpRequest: abort() after a timeout should not fire \"abort\" event",0,null,null]]]}]
10:03:17 INFO - .
10:03:17 INFO - TEST-OK | /XMLHttpRequest/abort-after-timeout.htm | took 910ms
10:03:17 INFO - PROCESS | 5544 | 1477587797674 Marionette TRACE conn5 -> [0,27,"getWindowHandle",null]
10:03:17 INFO - PROCESS | 5544 | 1477587797678 Marionette TRACE conn5 <- [1,27,null,{"value":"2147483652"}]
10:03:17 INFO - TEST-START | /XMLHttpRequest/abort-during-done.htm
10:03:17 INFO - PROCESS | 5544 | 1477587797683 Marionette TRACE conn5 -> [0,28,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:17 INFO - PROCESS | 5544 | 1477587797778 Marionette TRACE conn5 <- [1,28,null,{"value":null}]
10:03:17 INFO - PROCESS | 5544 | 1477587797801 Marionette TRACE conn5 -> [0,29,"getWindowHandles",null]
10:03:17 INFO - PROCESS | 5544 | 1477587797804 Marionette TRACE conn5 <- [1,29,null,["2147483652"]]
10:03:17 INFO - PROCESS | 5544 | 1477587797808 Marionette TRACE conn5 -> [0,30,"switchToWindow",{"name":"2147483652"}]
10:03:17 INFO - PROCESS | 5544 | 1477587797813 Marionette TRACE conn5 <- [1,30,null,{}]
10:03:17 INFO - PROCESS | 5544 | 1477587797817 Marionette TRACE conn5 -> [0,31,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-done.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-done.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:17 INFO - PROCESS | 5544 | ++DOCSHELL 08F42C00 == 4 [pid = 5820] [id = 7]
10:03:17 INFO - PROCESS | 5544 | ++DOMWINDOW == 9 (08F45400) [pid = 5820] [serial = 21] [outer = 00000000]
10:03:17 INFO - PROCESS | 5544 | ++DOMWINDOW == 10 (0AC22400) [pid = 5820] [serial = 22] [outer = 08F45400]
10:03:17 INFO - PROCESS | 5544 | ++DOMWINDOW == 11 (0C852C00) [pid = 5820] [serial = 23] [outer = 08F45400]
10:03:18 INFO - PROCESS | 5544 | 1477587798195 Marionette TRACE conn5 <- [1,31,null,{"value":["/XMLHttpRequest/abort-during-done.htm",0,null,null,[["XMLHttpRequest: abort() during DONE",0,null,null]]]}]
10:03:18 INFO - PROCESS | 5544 | ++DOMWINDOW == 15 (0F5F9000) [pid = 5544] [serial = 23] [outer = 0E880800]
10:03:18 INFO - .
10:03:18 INFO - TEST-OK | /XMLHttpRequest/abort-during-done.htm | took 570ms
10:03:18 INFO - PROCESS | 5544 | 1477587798270 Marionette TRACE conn5 -> [0,32,"getWindowHandle",null]
10:03:18 INFO - PROCESS | 5544 | 1477587798275 Marionette TRACE conn5 <- [1,32,null,{"value":"2147483652"}]
10:03:18 INFO - TEST-START | /XMLHttpRequest/abort-during-open.htm
10:03:18 INFO - PROCESS | 5544 | 1477587798316 Marionette TRACE conn5 -> [0,33,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:18 INFO - PROCESS | 5544 | 1477587798415 Marionette TRACE conn5 <- [1,33,null,{"value":null}]
10:03:18 INFO - PROCESS | 5544 | 1477587798436 Marionette TRACE conn5 -> [0,34,"getWindowHandles",null]
10:03:18 INFO - PROCESS | 5544 | 1477587798439 Marionette TRACE conn5 <- [1,34,null,["2147483652"]]
10:03:18 INFO - PROCESS | 5544 | 1477587798442 Marionette TRACE conn5 -> [0,35,"switchToWindow",{"name":"2147483652"}]
10:03:18 INFO - PROCESS | 5544 | 1477587798447 Marionette TRACE conn5 <- [1,35,null,{}]
10:03:18 INFO - PROCESS | 5544 | 1477587798451 Marionette TRACE conn5 -> [0,36,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-open.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:18 INFO - PROCESS | 5544 | ++DOCSHELL 0CC06C00 == 5 [pid = 5820] [id = 8]
10:03:18 INFO - PROCESS | 5544 | ++DOMWINDOW == 12 (0CC09800) [pid = 5820] [serial = 24] [outer = 00000000]
10:03:18 INFO - PROCESS | 5544 | ++DOMWINDOW == 13 (0CC12C00) [pid = 5820] [serial = 25] [outer = 0CC09800]
10:03:18 INFO - PROCESS | 5544 | ++DOMWINDOW == 14 (0CCE4000) [pid = 5820] [serial = 26] [outer = 0CC09800]
10:03:18 INFO - PROCESS | 5544 | 1477587798843 Marionette TRACE conn5 <- [1,36,null,{"value":["/XMLHttpRequest/abort-during-open.htm",0,null,null,[["XMLHttpRequest: abort() during OPEN",0,null,null]]]}]
10:03:18 INFO - .
10:03:18 INFO - TEST-OK | /XMLHttpRequest/abort-during-open.htm | took 570ms
10:03:18 INFO - PROCESS | 5544 | 1477587798862 Marionette TRACE conn5 -> [0,37,"getWindowHandle",null]
10:03:18 INFO - PROCESS | 5544 | 1477587798865 Marionette TRACE conn5 <- [1,37,null,{"value":"2147483652"}]
10:03:18 INFO - TEST-START | /XMLHttpRequest/abort-during-open.worker
10:03:18 INFO - PROCESS | 5544 | 1477587798875 Marionette TRACE conn5 -> [0,38,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:18 INFO - PROCESS | 5544 | 1477587798957 Marionette TRACE conn5 <- [1,38,null,{"value":null}]
10:03:18 INFO - PROCESS | 5544 | 1477587798971 Marionette TRACE conn5 -> [0,39,"getWindowHandles",null]
10:03:18 INFO - PROCESS | 5544 | 1477587798974 Marionette TRACE conn5 <- [1,39,null,["2147483652"]]
10:03:18 INFO - PROCESS | 5544 | 1477587798977 Marionette TRACE conn5 -> [0,40,"switchToWindow",{"name":"2147483652"}]
10:03:18 INFO - PROCESS | 5544 | 1477587798981 Marionette TRACE conn5 <- [1,40,null,{}]
10:03:18 INFO - PROCESS | 5544 | 1477587798985 Marionette TRACE conn5 -> [0,41,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-open.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-open.worker\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:19 INFO - PROCESS | 5544 | ++DOCSHELL 0CF58C00 == 6 [pid = 5820] [id = 9]
10:03:19 INFO - PROCESS | 5544 | ++DOMWINDOW == 15 (0CF5DC00) [pid = 5820] [serial = 27] [outer = 00000000]
10:03:19 INFO - PROCESS | 5544 | ++DOMWINDOW == 16 (0D40BC00) [pid = 5820] [serial = 28] [outer = 0CF5DC00]
10:03:19 INFO - PROCESS | 5544 | ++DOMWINDOW == 17 (0D411000) [pid = 5820] [serial = 29] [outer = 0CF5DC00]
10:03:19 INFO - PROCESS | 5544 | 1477587799397 Marionette TRACE conn5 <- [1,41,null,{"value":["/XMLHttpRequest/abort-during-open.worker",0,null,null,[["Untitled",0,{},{}]]]}]
10:03:19 INFO - .
10:03:19 INFO - TEST-OK | /XMLHttpRequest/abort-during-open.worker | took 570ms
10:03:19 INFO - TEST-START | /XMLHttpRequest/abort-during-unsent.htm
10:03:19 INFO - PROCESS | 5544 | 1477587799445 Marionette TRACE conn5 -> [0,42,"getWindowHandle",null]
10:03:19 INFO - PROCESS | 5544 | 1477587799447 Marionette TRACE conn5 <- [1,42,null,{"value":"2147483652"}]
10:03:19 INFO - PROCESS | 5544 | 1477587799451 Marionette TRACE conn5 -> [0,43,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:19 INFO - PROCESS | 5544 | 1477587799522 Marionette TRACE conn5 <- [1,43,null,{"value":null}]
10:03:19 INFO - PROCESS | 5544 | 1477587799536 Marionette TRACE conn5 -> [0,44,"getWindowHandles",null]
10:03:19 INFO - PROCESS | 5544 | 1477587799538 Marionette TRACE conn5 <- [1,44,null,["2147483652"]]
10:03:19 INFO - PROCESS | 5544 | 1477587799542 Marionette TRACE conn5 -> [0,45,"switchToWindow",{"name":"2147483652"}]
10:03:19 INFO - PROCESS | 5544 | 1477587799545 Marionette TRACE conn5 <- [1,45,null,{}]
10:03:19 INFO - PROCESS | 5544 | 1477587799549 Marionette TRACE conn5 -> [0,46,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-unsent.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-unsent.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:19 INFO - PROCESS | 5544 | ++DOCSHELL 0D412400 == 7 [pid = 5820] [id = 10]
10:03:19 INFO - PROCESS | 5544 | ++DOMWINDOW == 18 (0D414000) [pid = 5820] [serial = 30] [outer = 00000000]
10:03:19 INFO - PROCESS | 5544 | ++DOMWINDOW == 19 (0D4EC000) [pid = 5820] [serial = 31] [outer = 0D414000]
10:03:19 INFO - PROCESS | 5544 | ++DOMWINDOW == 20 (0D734C00) [pid = 5820] [serial = 32] [outer = 0D414000]
10:03:19 INFO - PROCESS | 5544 | 1477587799881 Marionette TRACE conn5 <- [1,46,null,{"value":["/XMLHttpRequest/abort-during-unsent.htm",0,null,null,[["XMLHttpRequest: abort() during UNSENT",0,null,null]]]}]
10:03:19 INFO - .
10:03:19 INFO - TEST-OK | /XMLHttpRequest/abort-during-unsent.htm | took 470ms
10:03:19 INFO - PROCESS | 5544 | 1477587799925 Marionette TRACE conn5 -> [0,47,"getWindowHandle",null]
10:03:19 INFO - PROCESS | 5544 | 1477587799928 Marionette TRACE conn5 <- [1,47,null,{"value":"2147483652"}]
10:03:19 INFO - TEST-START | /XMLHttpRequest/abort-during-upload.htm
10:03:19 INFO - PROCESS | 5544 | 1477587799932 Marionette TRACE conn5 -> [0,48,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:20 INFO - PROCESS | 5544 | 1477587800045 Marionette TRACE conn5 <- [1,48,null,{"value":null}]
10:03:20 INFO - PROCESS | 5544 | 1477587800058 Marionette TRACE conn5 -> [0,49,"getWindowHandles",null]
10:03:20 INFO - PROCESS | 5544 | 1477587800061 Marionette TRACE conn5 <- [1,49,null,["2147483652"]]
10:03:20 INFO - PROCESS | 5544 | 1477587800064 Marionette TRACE conn5 -> [0,50,"switchToWindow",{"name":"2147483652"}]
10:03:20 INFO - PROCESS | 5544 | 1477587800067 Marionette TRACE conn5 <- [1,50,null,{}]
10:03:20 INFO - PROCESS | 5544 | 1477587800071 Marionette TRACE conn5 -> [0,51,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-upload.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-upload.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:20 INFO - PROCESS | 5544 | ++DOCSHELL 0D733400 == 8 [pid = 5820] [id = 11]
10:03:20 INFO - PROCESS | 5544 | ++DOMWINDOW == 21 (0D736400) [pid = 5820] [serial = 33] [outer = 00000000]
10:03:20 INFO - PROCESS | 5544 | ++DOMWINDOW == 22 (0D7B3800) [pid = 5820] [serial = 34] [outer = 0D736400]
10:03:20 INFO - PROCESS | 5544 | ++DOMWINDOW == 23 (0D91B400) [pid = 5820] [serial = 35] [outer = 0D736400]
10:03:20 INFO - PROCESS | 5544 | 1477587800432 Marionette TRACE conn5 <- [1,51,null,{"value":["/XMLHttpRequest/abort-during-upload.htm",0,null,null,[["XMLHttpRequest: abort() while sending data",0,null,null]]]}]
10:03:20 INFO - .
10:03:20 INFO - TEST-OK | /XMLHttpRequest/abort-during-upload.htm | took 530ms
10:03:20 INFO - PROCESS | 5544 | 1477587800465 Marionette TRACE conn5 -> [0,52,"getWindowHandle",null]
10:03:20 INFO - PROCESS | 5544 | 1477587800468 Marionette TRACE conn5 <- [1,52,null,{"value":"2147483652"}]
10:03:20 INFO - PROCESS | 5544 | 1477587800472 Marionette TRACE conn5 -> [0,53,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:20 INFO - TEST-START | /XMLHttpRequest/abort-event-abort.htm
10:03:20 INFO - PROCESS | 5544 | 1477587800544 Marionette TRACE conn5 <- [1,53,null,{"value":null}]
10:03:20 INFO - PROCESS | 5544 | 1477587800557 Marionette TRACE conn5 -> [0,54,"getWindowHandles",null]
10:03:20 INFO - PROCESS | 5544 | 1477587800560 Marionette TRACE conn5 <- [1,54,null,["2147483652"]]
10:03:20 INFO - PROCESS | 5544 | 1477587800563 Marionette TRACE conn5 -> [0,55,"switchToWindow",{"name":"2147483652"}]
10:03:20 INFO - PROCESS | 5544 | 1477587800566 Marionette TRACE conn5 <- [1,55,null,{}]
10:03:20 INFO - PROCESS | 5544 | 1477587800570 Marionette TRACE conn5 -> [0,56,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-abort.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:20 INFO - PROCESS | 5544 | ++DOCSHELL 0D91EC00 == 9 [pid = 5820] [id = 12]
10:03:20 INFO - PROCESS | 5544 | ++DOMWINDOW == 24 (08F47000) [pid = 5820] [serial = 36] [outer = 00000000]
10:03:20 INFO - PROCESS | 5544 | [Child 5820] WARNING: No inner window available!: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/base/nsGlobalWindow.cpp, line 9723
10:03:20 INFO - PROCESS | 5544 | ++DOMWINDOW == 25 (087A3800) [pid = 5820] [serial = 37] [outer = 08F47000]
10:03:20 INFO - PROCESS | 5544 | ++DOMWINDOW == 26 (0AC1F800) [pid = 5820] [serial = 38] [outer = 08F47000]
10:03:21 INFO - PROCESS | 5544 | --DOCSHELL 0D412400 == 8 [pid = 5820] [id = 10]
10:03:21 INFO - PROCESS | 5544 | --DOCSHELL 0D733400 == 7 [pid = 5820] [id = 11]
10:03:21 INFO - PROCESS | 5544 | --DOCSHELL 0CC06C00 == 6 [pid = 5820] [id = 8]
10:03:21 INFO - PROCESS | 5544 | --DOCSHELL 0CF58C00 == 5 [pid = 5820] [id = 9]
10:03:21 INFO - PROCESS | 5544 | --DOCSHELL 0D735C00 == 4 [pid = 5820] [id = 5]
10:03:21 INFO - PROCESS | 5544 | --DOCSHELL 0879B000 == 3 [pid = 5820] [id = 6]
10:03:21 INFO - PROCESS | 5544 | --DOCSHELL 08F42C00 == 2 [pid = 5820] [id = 7]
10:03:21 INFO - PROCESS | 5544 | 1477587801103 Marionette TRACE conn5 <- [1,56,null,{"value":["/XMLHttpRequest/abort-event-abort.htm",0,null,null,[["XMLHttpRequest: The abort() method: do not fire abort event in OPENED state when send() flag is unset. send() throws after abort().",0,null,null]]]}]
10:03:21 INFO - .
10:03:21 INFO - TEST-OK | /XMLHttpRequest/abort-event-abort.htm | took 671ms
10:03:21 INFO - PROCESS | 5544 | 1477587801146 Marionette TRACE conn5 -> [0,57,"getWindowHandle",null]
10:03:21 INFO - PROCESS | 5544 | 1477587801148 Marionette TRACE conn5 <- [1,57,null,{"value":"2147483652"}]
10:03:21 INFO - PROCESS | 5544 | 1477587801152 Marionette TRACE conn5 -> [0,58,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:21 INFO - TEST-START | /XMLHttpRequest/abort-event-listeners.htm
10:03:21 INFO - PROCESS | 5544 | 1477587801221 Marionette TRACE conn5 <- [1,58,null,{"value":null}]
10:03:21 INFO - PROCESS | 5544 | 1477587801233 Marionette TRACE conn5 -> [0,59,"getWindowHandles",null]
10:03:21 INFO - PROCESS | 5544 | 1477587801236 Marionette TRACE conn5 <- [1,59,null,["2147483652"]]
10:03:21 INFO - PROCESS | 5544 | 1477587801241 Marionette TRACE conn5 -> [0,60,"switchToWindow",{"name":"2147483652"}]
10:03:21 INFO - PROCESS | 5544 | 1477587801244 Marionette TRACE conn5 <- [1,60,null,{}]
10:03:21 INFO - PROCESS | 5544 | 1477587801247 Marionette TRACE conn5 -> [0,61,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-listeners.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-listeners.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:21 INFO - PROCESS | 5544 | ++DOCSHELL 0C85F400 == 3 [pid = 5820] [id = 13]
10:03:21 INFO - PROCESS | 5544 | ++DOMWINDOW == 27 (0CB14000) [pid = 5820] [serial = 39] [outer = 00000000]
10:03:21 INFO - PROCESS | 5544 | ++DOMWINDOW == 28 (0CF58C00) [pid = 5820] [serial = 40] [outer = 0CB14000]
10:03:21 INFO - PROCESS | 5544 | ++DOMWINDOW == 29 (0D410400) [pid = 5820] [serial = 41] [outer = 0CB14000]
10:03:21 INFO - PROCESS | 5544 | 1477587801593 Marionette TRACE conn5 <- [1,61,null,{"value":["/XMLHttpRequest/abort-event-listeners.htm",0,null,null,[["XMLHttpRequest: abort() should not reset event listeners",0,null,null]]]}]
10:03:21 INFO - .
10:03:21 INFO - TEST-OK | /XMLHttpRequest/abort-event-listeners.htm | took 470ms
10:03:21 INFO - PROCESS | 5544 | 1477587801627 Marionette TRACE conn5 -> [0,62,"getWindowHandle",null]
10:03:21 INFO - PROCESS | 5544 | 1477587801630 Marionette TRACE conn5 <- [1,62,null,{"value":"2147483652"}]
10:03:21 INFO - TEST-START | /XMLHttpRequest/abort-event-loadend.htm
10:03:21 INFO - PROCESS | 5544 | 1477587801639 Marionette TRACE conn5 -> [0,63,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:21 INFO - PROCESS | 5544 | 1477587801713 Marionette TRACE conn5 <- [1,63,null,{"value":null}]
10:03:21 INFO - PROCESS | 5544 | 1477587801726 Marionette TRACE conn5 -> [0,64,"getWindowHandles",null]
10:03:21 INFO - PROCESS | 5544 | 1477587801729 Marionette TRACE conn5 <- [1,64,null,["2147483652"]]
10:03:21 INFO - PROCESS | 5544 | 1477587801732 Marionette TRACE conn5 -> [0,65,"switchToWindow",{"name":"2147483652"}]
10:03:21 INFO - PROCESS | 5544 | 1477587801736 Marionette TRACE conn5 <- [1,65,null,{}]
10:03:21 INFO - PROCESS | 5544 | 1477587801740 Marionette TRACE conn5 -> [0,66,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-loadend.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:21 INFO - PROCESS | 5544 | ++DOCSHELL 0D4E9C00 == 4 [pid = 5820] [id = 14]
10:03:21 INFO - PROCESS | 5544 | ++DOMWINDOW == 30 (0D733400) [pid = 5820] [serial = 42] [outer = 00000000]
10:03:21 INFO - PROCESS | 5544 | ++DOMWINDOW == 31 (0D920400) [pid = 5820] [serial = 43] [outer = 0D733400]
10:03:21 INFO - PROCESS | 5544 | ++DOMWINDOW == 32 (0DAB8000) [pid = 5820] [serial = 44] [outer = 0D733400]
10:03:22 INFO - PROCESS | 5544 | 1477587802079 Marionette TRACE conn5 <- [1,66,null,{"value":["/XMLHttpRequest/abort-event-loadend.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named loadend",0,null,null]]]}]
10:03:22 INFO - .
10:03:22 INFO - TEST-OK | /XMLHttpRequest/abort-event-loadend.htm | took 470ms
10:03:22 INFO - PROCESS | 5544 | 1477587802106 Marionette TRACE conn5 -> [0,67,"getWindowHandle",null]
10:03:22 INFO - PROCESS | 5544 | 1477587802108 Marionette TRACE conn5 <- [1,67,null,{"value":"2147483652"}]
10:03:22 INFO - TEST-START | /XMLHttpRequest/abort-event-order.htm
10:03:22 INFO - PROCESS | 5544 | 1477587802113 Marionette TRACE conn5 -> [0,68,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:22 INFO - PROCESS | 5544 | 1477587802188 Marionette TRACE conn5 <- [1,68,null,{"value":null}]
10:03:22 INFO - PROCESS | 5544 | 1477587802198 Marionette TRACE conn5 -> [0,69,"getWindowHandles",null]
10:03:22 INFO - PROCESS | 5544 | 1477587802200 Marionette TRACE conn5 <- [1,69,null,["2147483652"]]
10:03:22 INFO - PROCESS | 5544 | 1477587802209 Marionette TRACE conn5 -> [0,70,"switchToWindow",{"name":"2147483652"}]
10:03:22 INFO - PROCESS | 5544 | 1477587802214 Marionette TRACE conn5 <- [1,70,null,{}]
10:03:22 INFO - PROCESS | 5544 | 1477587802222 Marionette TRACE conn5 -> [0,71,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-order.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-order.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:22 INFO - PROCESS | 5544 | ++DOCSHELL 0DAC0800 == 5 [pid = 5820] [id = 15]
10:03:22 INFO - PROCESS | 5544 | ++DOMWINDOW == 33 (0DAC1C00) [pid = 5820] [serial = 45] [outer = 00000000]
10:03:22 INFO - PROCESS | 5544 | ++DOMWINDOW == 34 (0AC96000) [pid = 5820] [serial = 46] [outer = 0DAC1C00]
10:03:22 INFO - PROCESS | 5544 | ++DOMWINDOW == 35 (0AC99400) [pid = 5820] [serial = 47] [outer = 0DAC1C00]
10:03:22 INFO - PROCESS | 5544 | 1477587802570 Marionette TRACE conn5 <- [1,71,null,{"value":["/XMLHttpRequest/abort-event-order.htm",0,null,null,[["XMLHttpRequest: The abort() method: abort and loadend events",0,null,null]]]}]
10:03:22 INFO - .
10:03:22 INFO - TEST-OK | /XMLHttpRequest/abort-event-order.htm | took 470ms
10:03:22 INFO - PROCESS | 5544 | 1477587802586 Marionette TRACE conn5 -> [0,72,"getWindowHandle",null]
10:03:22 INFO - PROCESS | 5544 | 1477587802588 Marionette TRACE conn5 <- [1,72,null,{"value":"2147483652"}]
10:03:22 INFO - TEST-START | /XMLHttpRequest/abort-upload-event-abort.htm
10:03:22 INFO - PROCESS | 5544 | 1477587802596 Marionette TRACE conn5 -> [0,73,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:22 INFO - PROCESS | 5544 | 1477587802673 Marionette TRACE conn5 <- [1,73,null,{"value":null}]
10:03:22 INFO - PROCESS | 5544 | 1477587802693 Marionette TRACE conn5 -> [0,74,"getWindowHandles",null]
10:03:22 INFO - PROCESS | 5544 | 1477587802695 Marionette TRACE conn5 <- [1,74,null,["2147483652"]]
10:03:22 INFO - PROCESS | 5544 | 1477587802698 Marionette TRACE conn5 -> [0,75,"switchToWindow",{"name":"2147483652"}]
10:03:22 INFO - PROCESS | 5544 | 1477587802703 Marionette TRACE conn5 <- [1,75,null,{}]
10:03:22 INFO - PROCESS | 5544 | 1477587802707 Marionette TRACE conn5 -> [0,76,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-upload-event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-abort.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:22 INFO - PROCESS | 5544 | ++DOCSHELL 0D8AB400 == 6 [pid = 5820] [id = 16]
10:03:22 INFO - PROCESS | 5544 | ++DOMWINDOW == 36 (0D8AB800) [pid = 5820] [serial = 48] [outer = 00000000]
10:03:22 INFO - PROCESS | 5544 | ++DOMWINDOW == 37 (0D8AF400) [pid = 5820] [serial = 49] [outer = 0D8AB800]
10:03:22 INFO - PROCESS | 5544 | ++DOMWINDOW == 38 (0D8B1400) [pid = 5820] [serial = 50] [outer = 0D8AB800]
10:03:23 INFO - PROCESS | 5544 | 1477587803070 Marionette TRACE conn5 <- [1,76,null,{"value":["/XMLHttpRequest/abort-upload-event-abort.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named abort on the XMLHttpRequestUpload object",0,null,null]]]}]
10:03:23 INFO - .
10:03:23 INFO - TEST-OK | /XMLHttpRequest/abort-upload-event-abort.htm | took 510ms
10:03:23 INFO - PROCESS | 5544 | 1477587803106 Marionette TRACE conn5 -> [0,77,"getWindowHandle",null]
10:03:23 INFO - PROCESS | 5544 | 1477587803108 Marionette TRACE conn5 <- [1,77,null,{"value":"2147483652"}]
10:03:23 INFO - TEST-START | /XMLHttpRequest/abort-upload-event-loadend.htm
10:03:23 INFO - PROCESS | 5544 | 1477587803112 Marionette TRACE conn5 -> [0,78,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:23 INFO - PROCESS | 5544 | 1477587803186 Marionette TRACE conn5 <- [1,78,null,{"value":null}]
10:03:23 INFO - PROCESS | 5544 | 1477587803197 Marionette TRACE conn5 -> [0,79,"getWindowHandles",null]
10:03:23 INFO - PROCESS | 5544 | 1477587803199 Marionette TRACE conn5 <- [1,79,null,["2147483652"]]
10:03:23 INFO - PROCESS | 5544 | 1477587803204 Marionette TRACE conn5 -> [0,80,"switchToWindow",{"name":"2147483652"}]
10:03:23 INFO - PROCESS | 5544 | 1477587803207 Marionette TRACE conn5 <- [1,80,null,{}]
10:03:23 INFO - PROCESS | 5544 | 1477587803211 Marionette TRACE conn5 -> [0,81,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-upload-event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-loadend.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:23 INFO - PROCESS | 5544 | ++DOCSHELL 0D8AF800 == 7 [pid = 5820] [id = 17]
10:03:23 INFO - PROCESS | 5544 | ++DOMWINDOW == 39 (0D8B2000) [pid = 5820] [serial = 51] [outer = 00000000]
10:03:23 INFO - PROCESS | 5544 | ++DOMWINDOW == 40 (0DB47C00) [pid = 5820] [serial = 52] [outer = 0D8B2000]
10:03:23 INFO - PROCESS | 5544 | ++DOMWINDOW == 41 (0DB4A400) [pid = 5820] [serial = 53] [outer = 0D8B2000]
10:03:23 INFO - PROCESS | 5544 | 1477587803558 Marionette TRACE conn5 <- [1,81,null,{"value":["/XMLHttpRequest/abort-upload-event-loadend.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named loadend on the XMLHttpRequestUpload object",0,null,null]]]}]
10:03:23 INFO - .
10:03:23 INFO - TEST-OK | /XMLHttpRequest/abort-upload-event-loadend.htm | took 470ms
10:03:23 INFO - PROCESS | 5544 | 1477587803582 Marionette TRACE conn5 -> [0,82,"getWindowHandle",null]
10:03:23 INFO - PROCESS | 5544 | 1477587803584 Marionette TRACE conn5 <- [1,82,null,{"value":"2147483652"}]
10:03:23 INFO - TEST-START | /XMLHttpRequest/anonymous-mode-unsupported.htm
10:03:23 INFO - PROCESS | 5544 | 1477587803588 Marionette TRACE conn5 -> [0,83,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:23 INFO - PROCESS | 5544 | 1477587803682 Marionette TRACE conn5 <- [1,83,null,{"value":null}]
10:03:23 INFO - PROCESS | 5544 | 1477587803692 Marionette TRACE conn5 -> [0,84,"getWindowHandles",null]
10:03:23 INFO - PROCESS | 5544 | 1477587803694 Marionette TRACE conn5 <- [1,84,null,["2147483652"]]
10:03:23 INFO - PROCESS | 5544 | 1477587803698 Marionette TRACE conn5 -> [0,85,"switchToWindow",{"name":"2147483652"}]
10:03:23 INFO - PROCESS | 5544 | 1477587803702 Marionette TRACE conn5 <- [1,85,null,{}]
10:03:23 INFO - PROCESS | 5544 | 1477587803707 Marionette TRACE conn5 -> [0,86,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/anonymous-mode-unsupported.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/anonymous-mode-unsupported.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:23 INFO - PROCESS | 5544 | ++DOCSHELL 0B8D8C00 == 8 [pid = 5820] [id = 18]
10:03:23 INFO - PROCESS | 5544 | ++DOMWINDOW == 42 (0B8D9C00) [pid = 5820] [serial = 54] [outer = 00000000]
10:03:23 INFO - PROCESS | 5544 | ++DOMWINDOW == 43 (0B8DDC00) [pid = 5820] [serial = 55] [outer = 0B8D9C00]
10:03:23 INFO - PROCESS | 5544 | ++DOMWINDOW == 44 (0B8E1400) [pid = 5820] [serial = 56] [outer = 0B8D9C00]
10:03:24 INFO - PROCESS | 5544 | 1477587804067 Marionette TRACE conn5 <- [1,86,null,{"value":["/XMLHttpRequest/anonymous-mode-unsupported.htm",0,null,null,[["XMLHttpRequest: anonymous mode unsupported",0,null,null]]]}]
10:03:24 INFO - .
10:03:24 INFO - TEST-OK | /XMLHttpRequest/anonymous-mode-unsupported.htm | took 510ms
10:03:24 INFO - PROCESS | 5544 | 1477587804102 Marionette TRACE conn5 -> [0,87,"getWindowHandle",null]
10:03:24 INFO - PROCESS | 5544 | 1477587804104 Marionette TRACE conn5 <- [1,87,null,{"value":"2147483652"}]
10:03:24 INFO - PROCESS | 5544 | 1477587804108 Marionette TRACE conn5 -> [0,88,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:24 INFO - TEST-START | /XMLHttpRequest/data-uri.htm
10:03:24 INFO - PROCESS | 5544 | 1477587804173 Marionette TRACE conn5 <- [1,88,null,{"value":null}]
10:03:24 INFO - PROCESS | 5544 | 1477587804193 Marionette TRACE conn5 -> [0,89,"getWindowHandles",null]
10:03:24 INFO - PROCESS | 5544 | 1477587804195 Marionette TRACE conn5 <- [1,89,null,["2147483652"]]
10:03:24 INFO - PROCESS | 5544 | 1477587804198 Marionette TRACE conn5 -> [0,90,"switchToWindow",{"name":"2147483652"}]
10:03:24 INFO - PROCESS | 5544 | 1477587804202 Marionette TRACE conn5 <- [1,90,null,{}]
10:03:24 INFO - PROCESS | 5544 | 1477587804205 Marionette TRACE conn5 -> [0,91,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/data-uri.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/data-uri.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:24 INFO - PROCESS | 5544 | ++DOCSHELL 0B874800 == 9 [pid = 5820] [id = 19]
10:03:24 INFO - PROCESS | 5544 | ++DOMWINDOW == 45 (0B876000) [pid = 5820] [serial = 57] [outer = 00000000]
10:03:24 INFO - PROCESS | 5544 | ++DOMWINDOW == 46 (0B87A400) [pid = 5820] [serial = 58] [outer = 0B876000]
10:03:24 INFO - PROCESS | 5544 | ++DOMWINDOW == 47 (0B87CC00) [pid = 5820] [serial = 59] [outer = 0B876000]
10:03:24 INFO - PROCESS | 5544 | [Parent 5544] WARNING: pipe error: 109: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/ipc/chromium/src/chrome/common/ipc_channel_win.cc, line 345
10:03:24 INFO - PROCESS | 5544 | 1477587804706 Marionette TRACE conn5 <- [1,91,null,{"value":["/XMLHttpRequest/data-uri.htm",0,null,null,[["XHR method GET with charset text/plain",0,null,null],["XHR method GET with charset text/plain (base64)",0,null,null],["XHR method GET with charset text/html",0,null,null],["XHR method GET with charset text/html;charset=UTF-8",0,null,null],["XHR method GET with charset image/png",1,"assert_equals: expected \"Hello, World!\" but got \"Hello,World!\"","do_test/ [0,92,"getWindowHandle",null]
10:03:24 INFO - PROCESS | 5544 | 1477587804781 Marionette TRACE conn5 <- [1,92,null,{"value":"2147483652"}]
10:03:24 INFO - TEST-START | /XMLHttpRequest/event-abort.htm
10:03:24 INFO - PROCESS | 5544 | 1477587804785 Marionette TRACE conn5 -> [0,93,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:24 INFO - PROCESS | 5544 | 1477587804854 Marionette TRACE conn5 <- [1,93,null,{"value":null}]
10:03:24 INFO - PROCESS | 5544 | 1477587804866 Marionette TRACE conn5 -> [0,94,"getWindowHandles",null]
10:03:24 INFO - PROCESS | 5544 | 1477587804868 Marionette TRACE conn5 <- [1,94,null,["2147483652"]]
10:03:24 INFO - PROCESS | 5544 | 1477587804872 Marionette TRACE conn5 -> [0,95,"switchToWindow",{"name":"2147483652"}]
10:03:24 INFO - PROCESS | 5544 | 1477587804875 Marionette TRACE conn5 <- [1,95,null,{}]
10:03:24 INFO - PROCESS | 5544 | 1477587804886 Marionette TRACE conn5 -> [0,96,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-abort.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:24 INFO - PROCESS | 5544 | ++DOCSHELL 0B876800 == 10 [pid = 5820] [id = 20]
10:03:24 INFO - PROCESS | 5544 | ++DOMWINDOW == 48 (0B879C00) [pid = 5820] [serial = 60] [outer = 00000000]
10:03:24 INFO - PROCESS | 5544 | ++DOMWINDOW == 49 (0B9FAC00) [pid = 5820] [serial = 61] [outer = 0B879C00]
10:03:25 INFO - PROCESS | 5544 | ++DOMWINDOW == 50 (0B9FD000) [pid = 5820] [serial = 62] [outer = 0B879C00]
10:03:25 INFO - PROCESS | 5544 | 1477587805266 Marionette TRACE conn5 <- [1,96,null,{"value":["/XMLHttpRequest/event-abort.htm",0,null,null,[["XMLHttpRequest: abort event",0,null,null]]]}]
10:03:25 INFO - .
10:03:25 INFO - TEST-OK | /XMLHttpRequest/event-abort.htm | took 510ms
10:03:25 INFO - PROCESS | 5544 | 1477587805299 Marionette TRACE conn5 -> [0,97,"getWindowHandle",null]
10:03:25 INFO - PROCESS | 5544 | 1477587805301 Marionette TRACE conn5 <- [1,97,null,{"value":"2147483652"}]
10:03:25 INFO - TEST-START | /XMLHttpRequest/event-error-order.sub.html
10:03:25 INFO - PROCESS | 5544 | 1477587805305 Marionette TRACE conn5 -> [0,98,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:25 INFO - PROCESS | 5544 | 1477587805372 Marionette TRACE conn5 <- [1,98,null,{"value":null}]
10:03:25 INFO - PROCESS | 5544 | 1477587805394 Marionette TRACE conn5 -> [0,99,"getWindowHandles",null]
10:03:25 INFO - PROCESS | 5544 | 1477587805396 Marionette TRACE conn5 <- [1,99,null,["2147483652"]]
10:03:25 INFO - PROCESS | 5544 | 1477587805400 Marionette TRACE conn5 -> [0,100,"switchToWindow",{"name":"2147483652"}]
10:03:25 INFO - PROCESS | 5544 | 1477587805403 Marionette TRACE conn5 <- [1,100,null,{}]
10:03:25 INFO - PROCESS | 5544 | 1477587805406 Marionette TRACE conn5 -> [0,101,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-error-order.sub.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-error-order.sub.html\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:25 INFO - PROCESS | 5544 | ++DOCSHELL 0AE9C800 == 11 [pid = 5820] [id = 21]
10:03:25 INFO - PROCESS | 5544 | ++DOMWINDOW == 51 (0AE9D000) [pid = 5820] [serial = 63] [outer = 00000000]
10:03:25 INFO - PROCESS | 5544 | ++DOMWINDOW == 52 (0AEA2800) [pid = 5820] [serial = 64] [outer = 0AE9D000]
10:03:25 INFO - PROCESS | 5544 | ++DOMWINDOW == 53 (0B9F4000) [pid = 5820] [serial = 65] [outer = 0AE9D000]
10:03:25 INFO - PROCESS | 5544 | [Parent 5544] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x804B001E: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553
10:03:25 INFO - PROCESS | 5544 | [Parent 5544] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x805303F4: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 1293
10:03:25 INFO - PROCESS | 5544 | [Child 5820] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x805303F4: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553
10:03:25 INFO - PROCESS | 5544 | 1477587805786 Marionette TRACE conn5 <- [1,101,null,{"value":["/XMLHttpRequest/event-error-order.sub.html",0,null,null,[["XMLHttpRequest: event - error (order of events)",0,null,null]]]}]
10:03:25 INFO - .
10:03:25 INFO - TEST-OK | /XMLHttpRequest/event-error-order.sub.html | took 530ms
10:03:25 INFO - PROCESS | 5544 | 1477587805839 Marionette TRACE conn5 -> [0,102,"getWindowHandle",null]
10:03:25 INFO - PROCESS | 5544 | 1477587805841 Marionette TRACE conn5 <- [1,102,null,{"value":"2147483652"}]
10:03:25 INFO - TEST-START | /XMLHttpRequest/event-error.sub.html
10:03:25 INFO - PROCESS | 5544 | 1477587805846 Marionette TRACE conn5 -> [0,103,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:25 INFO - PROCESS | 5544 | 1477587805911 Marionette TRACE conn5 <- [1,103,null,{"value":null}]
10:03:25 INFO - PROCESS | 5544 | 1477587805925 Marionette TRACE conn5 -> [0,104,"getWindowHandles",null]
10:03:25 INFO - PROCESS | 5544 | 1477587805927 Marionette TRACE conn5 <- [1,104,null,["2147483652"]]
10:03:25 INFO - PROCESS | 5544 | 1477587805930 Marionette TRACE conn5 -> [0,105,"switchToWindow",{"name":"2147483652"}]
10:03:25 INFO - PROCESS | 5544 | 1477587805933 Marionette TRACE conn5 <- [1,105,null,{}]
10:03:25 INFO - PROCESS | 5544 | 1477587805937 Marionette TRACE conn5 -> [0,106,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-error.sub.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-error.sub.html\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:25 INFO - PROCESS | 5544 | ++DOCSHELL 0AEA1000 == 12 [pid = 5820] [id = 22]
10:03:25 INFO - PROCESS | 5544 | ++DOMWINDOW == 54 (0AEA2000) [pid = 5820] [serial = 66] [outer = 00000000]
10:03:26 INFO - PROCESS | 5544 | ++DOMWINDOW == 55 (0DADB000) [pid = 5820] [serial = 67] [outer = 0AEA2000]
10:03:26 INFO - PROCESS | 5544 | ++DOMWINDOW == 56 (0DADD800) [pid = 5820] [serial = 68] [outer = 0AEA2000]
10:03:26 INFO - PROCESS | 5544 | [Child 5820] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x804B001E: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553
10:03:26 INFO - PROCESS | 5544 | 1477587806364 Marionette TRACE conn5 <- [1,106,null,{"value":["/XMLHttpRequest/event-error.sub.html",0,null,null,[["XMLHttpRequest Test: event - error",0,null,null]]]}]
10:03:26 INFO - .
10:03:26 INFO - TEST-OK | /XMLHttpRequest/event-error.sub.html | took 570ms
10:03:26 INFO - PROCESS | 5544 | 1477587806421 Marionette TRACE conn5 -> [0,107,"getWindowHandle",null]
10:03:26 INFO - PROCESS | 5544 | 1477587806427 Marionette TRACE conn5 <- [1,107,null,{"value":"2147483652"}]
10:03:26 INFO - TEST-START | /XMLHttpRequest/event-load.htm
10:03:26 INFO - PROCESS | 5544 | 1477587806433 Marionette TRACE conn5 -> [0,108,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:26 INFO - PROCESS | 5544 | 1477587806540 Marionette TRACE conn5 <- [1,108,null,{"value":null}]
10:03:26 INFO - PROCESS | 5544 | 1477587806574 Marionette TRACE conn5 -> [0,109,"getWindowHandles",null]
10:03:26 INFO - PROCESS | 5544 | 1477587806580 Marionette TRACE conn5 <- [1,109,null,["2147483652"]]
10:03:26 INFO - PROCESS | 5544 | 1477587806585 Marionette TRACE conn5 -> [0,110,"switchToWindow",{"name":"2147483652"}]
10:03:26 INFO - PROCESS | 5544 | 1477587806590 Marionette TRACE conn5 <- [1,110,null,{}]
10:03:26 INFO - PROCESS | 5544 | 1477587806594 Marionette TRACE conn5 -> [0,111,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-load.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-load.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:26 INFO - PROCESS | 5544 | ++DOCSHELL 0BFE8C00 == 13 [pid = 5820] [id = 23]
10:03:26 INFO - PROCESS | 5544 | ++DOMWINDOW == 57 (0BFE9C00) [pid = 5820] [serial = 69] [outer = 00000000]
10:03:26 INFO - PROCESS | 5544 | ++DOMWINDOW == 58 (0BFEF000) [pid = 5820] [serial = 70] [outer = 0BFE9C00]
10:03:26 INFO - PROCESS | 5544 | ++DOMWINDOW == 59 (0DAE1000) [pid = 5820] [serial = 71] [outer = 0BFE9C00]
10:03:27 INFO - PROCESS | 5544 | --DOCSHELL 0D91EC00 == 12 [pid = 5820] [id = 12]
10:03:27 INFO - PROCESS | 5544 | --DOCSHELL 0C85F400 == 11 [pid = 5820] [id = 13]
10:03:27 INFO - PROCESS | 5544 | --DOCSHELL 0D4E9C00 == 10 [pid = 5820] [id = 14]
10:03:27 INFO - PROCESS | 5544 | --DOCSHELL 0D8AB400 == 9 [pid = 5820] [id = 16]
10:03:27 INFO - PROCESS | 5544 | --DOCSHELL 0DAC0800 == 8 [pid = 5820] [id = 15]
10:03:27 INFO - PROCESS | 5544 | --DOCSHELL 0D8AF800 == 7 [pid = 5820] [id = 17]
10:03:27 INFO - PROCESS | 5544 | --DOCSHELL 0B876800 == 6 [pid = 5820] [id = 20]
10:03:27 INFO - PROCESS | 5544 | --DOCSHELL 0B874800 == 5 [pid = 5820] [id = 19]
10:03:27 INFO - PROCESS | 5544 | --DOCSHELL 0AEA1000 == 4 [pid = 5820] [id = 22]
10:03:27 INFO - PROCESS | 5544 | --DOCSHELL 0B8D8C00 == 3 [pid = 5820] [id = 18]
10:03:27 INFO - PROCESS | 5544 | --DOCSHELL 0AE9C800 == 2 [pid = 5820] [id = 21]
10:03:27 INFO - PROCESS | 5544 | 1477587807843 Marionette TRACE conn5 <- [1,111,null,{"value":["/XMLHttpRequest/event-load.htm",0,null,null,[["XMLHttpRequest: The send() method: Fire an event named load (synchronous flag is unset)",0,null,null]]]}]
10:03:27 INFO - .
10:03:27 INFO - TEST-OK | /XMLHttpRequest/event-load.htm | took 1418ms
10:03:27 INFO - PROCESS | 5544 | 1477587807854 Marionette TRACE conn5 -> [0,112,"getWindowHandle",null]
10:03:27 INFO - PROCESS | 5544 | 1477587807858 Marionette TRACE conn5 <- [1,112,null,{"value":"2147483652"}]
10:03:27 INFO - TEST-START | /XMLHttpRequest/event-loadend.htm
10:03:27 INFO - PROCESS | 5544 | 1477587807865 Marionette TRACE conn5 -> [0,113,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:27 INFO - PROCESS | 5544 | 1477587807970 Marionette TRACE conn5 <- [1,113,null,{"value":null}]
10:03:27 INFO - PROCESS | 5544 | 1477587807985 Marionette TRACE conn5 -> [0,114,"getWindowHandles",null]
10:03:27 INFO - PROCESS | 5544 | 1477587807990 Marionette TRACE conn5 <- [1,114,null,["2147483652"]]
10:03:28 INFO - PROCESS | 5544 | 1477587807994 Marionette TRACE conn5 -> [0,115,"switchToWindow",{"name":"2147483652"}]
10:03:28 INFO - PROCESS | 5544 | 1477587808004 Marionette TRACE conn5 <- [1,115,null,{}]
10:03:28 INFO - PROCESS | 5544 | 1477587808009 Marionette TRACE conn5 -> [0,116,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-loadend.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:28 INFO - PROCESS | 5544 | ++DOCSHELL 0AC93C00 == 3 [pid = 5820] [id = 24]
10:03:28 INFO - PROCESS | 5544 | ++DOMWINDOW == 60 (0AC94000) [pid = 5820] [serial = 72] [outer = 00000000]
10:03:28 INFO - PROCESS | 5544 | ++DOMWINDOW == 61 (0AC9D000) [pid = 5820] [serial = 73] [outer = 0AC94000]
10:03:28 INFO - PROCESS | 5544 | ++DOMWINDOW == 62 (0ACA1800) [pid = 5820] [serial = 74] [outer = 0AC94000]
10:03:28 INFO - PROCESS | 5544 | 1477587808398 Marionette TRACE conn5 <- [1,116,null,{"value":["/XMLHttpRequest/event-loadend.htm",0,null,null,[["XMLHttpRequest: loadend event",0,null,null]]]}]
10:03:28 INFO - .
10:03:28 INFO - TEST-OK | /XMLHttpRequest/event-loadend.htm | took 570ms
10:03:28 INFO - PROCESS | 5544 | 1477587808439 Marionette TRACE conn5 -> [0,117,"getWindowHandle",null]
10:03:28 INFO - TEST-START | /XMLHttpRequest/event-loadstart.htm
10:03:28 INFO - PROCESS | 5544 | 1477587808443 Marionette TRACE conn5 <- [1,117,null,{"value":"2147483652"}]
10:03:28 INFO - PROCESS | 5544 | 1477587808447 Marionette TRACE conn5 -> [0,118,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:28 INFO - PROCESS | 5544 | 1477587808528 Marionette TRACE conn5 <- [1,118,null,{"value":null}]
10:03:28 INFO - PROCESS | 5544 | 1477587808548 Marionette TRACE conn5 -> [0,119,"getWindowHandles",null]
10:03:28 INFO - PROCESS | 5544 | 1477587808551 Marionette TRACE conn5 <- [1,119,null,["2147483652"]]
10:03:28 INFO - PROCESS | 5544 | 1477587808555 Marionette TRACE conn5 -> [0,120,"switchToWindow",{"name":"2147483652"}]
10:03:28 INFO - PROCESS | 5544 | 1477587808558 Marionette TRACE conn5 <- [1,120,null,{}]
10:03:28 INFO - PROCESS | 5544 | 1477587808562 Marionette TRACE conn5 -> [0,121,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-loadstart.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-loadstart.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:28 INFO - PROCESS | 5544 | ++DOCSHELL 0AC9D400 == 4 [pid = 5820] [id = 25]
10:03:28 INFO - PROCESS | 5544 | ++DOMWINDOW == 63 (0AE98000) [pid = 5820] [serial = 75] [outer = 00000000]
10:03:28 INFO - PROCESS | 5544 | ++DOMWINDOW == 64 (0B87B400) [pid = 5820] [serial = 76] [outer = 0AE98000]
10:03:28 INFO - PROCESS | 5544 | ++DOMWINDOW == 65 (0B8D3000) [pid = 5820] [serial = 77] [outer = 0AE98000]
10:03:28 INFO - PROCESS | 5544 | 1477587808962 Marionette TRACE conn5 <- [1,121,null,{"value":["/XMLHttpRequest/event-loadstart.htm",0,null,null,[["XMLHttpRequest: loadstart event",0,null,null]]]}]
10:03:29 INFO - .
10:03:29 INFO - TEST-OK | /XMLHttpRequest/event-loadstart.htm | took 570ms
10:03:29 INFO - PROCESS | 5544 | 1477587809025 Marionette TRACE conn5 -> [0,122,"getWindowHandle",null]
10:03:29 INFO - PROCESS | 5544 | 1477587809030 Marionette TRACE conn5 <- [1,122,null,{"value":"2147483652"}]
10:03:29 INFO - TEST-START | /XMLHttpRequest/event-progress.htm
10:03:29 INFO - PROCESS | 5544 | 1477587809035 Marionette TRACE conn5 -> [0,123,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:29 INFO - PROCESS | 5544 | 1477587809109 Marionette TRACE conn5 <- [1,123,null,{"value":null}]
10:03:29 INFO - PROCESS | 5544 | 1477587809132 Marionette TRACE conn5 -> [0,124,"getWindowHandles",null]
10:03:29 INFO - PROCESS | 5544 | 1477587809136 Marionette TRACE conn5 <- [1,124,null,["2147483652"]]
10:03:29 INFO - PROCESS | 5544 | 1477587809139 Marionette TRACE conn5 -> [0,125,"switchToWindow",{"name":"2147483652"}]
10:03:29 INFO - PROCESS | 5544 | 1477587809144 Marionette TRACE conn5 <- [1,125,null,{}]
10:03:29 INFO - PROCESS | 5544 | 1477587809147 Marionette TRACE conn5 -> [0,126,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-progress.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-progress.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:29 INFO - PROCESS | 5544 | ++DOCSHELL 0B9F0000 == 5 [pid = 5820] [id = 26]
10:03:29 INFO - PROCESS | 5544 | ++DOMWINDOW == 66 (0B9F0C00) [pid = 5820] [serial = 78] [outer = 00000000]
10:03:29 INFO - PROCESS | 5544 | ++DOMWINDOW == 67 (0B9F5C00) [pid = 5820] [serial = 79] [outer = 0B9F0C00]
10:03:29 INFO - PROCESS | 5544 | ++DOMWINDOW == 68 (0B9FBC00) [pid = 5820] [serial = 80] [outer = 0B9F0C00]
10:03:32 INFO - PROCESS | 5544 | --DOMWINDOW == 67 (0AEA2000) [pid = 5820] [serial = 66] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-error.sub.html]
10:03:32 INFO - PROCESS | 5544 | --DOMWINDOW == 66 (0D7B0C00) [pid = 5820] [serial = 15] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm]
10:03:32 INFO - PROCESS | 5544 | 1477587812530 Marionette TRACE conn5 <- [1,126,null,{"value":["/XMLHttpRequest/event-progress.htm",0,null,null,[["XMLHttpRequest: The send() method: Fire a progress event named progress (synchronous flag is unset)",0,null,null]]]}]
10:03:32 INFO - .
10:03:32 INFO - TEST-OK | /XMLHttpRequest/event-progress.htm | took 3529ms
10:03:32 INFO - PROCESS | 5544 | 1477587812569 Marionette TRACE conn5 -> [0,127,"getWindowHandle",null]
10:03:32 INFO - PROCESS | 5544 | 1477587812574 Marionette TRACE conn5 <- [1,127,null,{"value":"2147483652"}]
10:03:32 INFO - TEST-START | /XMLHttpRequest/event-readystate-sync-open.htm
10:03:32 INFO - PROCESS | 5544 | 1477587812581 Marionette TRACE conn5 -> [0,128,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:32 INFO - PROCESS | 5544 | 1477587812699 Marionette TRACE conn5 <- [1,128,null,{"value":null}]
10:03:32 INFO - PROCESS | 5544 | 1477587812733 Marionette TRACE conn5 -> [0,129,"getWindowHandles",null]
10:03:32 INFO - PROCESS | 5544 | 1477587812738 Marionette TRACE conn5 <- [1,129,null,["2147483652"]]
10:03:32 INFO - PROCESS | 5544 | 1477587812743 Marionette TRACE conn5 -> [0,130,"switchToWindow",{"name":"2147483652"}]
10:03:32 INFO - PROCESS | 5544 | 1477587812755 Marionette TRACE conn5 <- [1,130,null,{}]
10:03:32 INFO - PROCESS | 5544 | 1477587812759 Marionette TRACE conn5 -> [0,131,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-readystate-sync-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-readystate-sync-open.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:32 INFO - PROCESS | 5544 | ++DOCSHELL 0B9FD400 == 6 [pid = 5820] [id = 27]
10:03:32 INFO - PROCESS | 5544 | ++DOMWINDOW == 67 (0BFF0000) [pid = 5820] [serial = 81] [outer = 00000000]
10:03:32 INFO - PROCESS | 5544 | ++DOMWINDOW == 68 (0C1B2800) [pid = 5820] [serial = 82] [outer = 0BFF0000]
10:03:32 INFO - PROCESS | 5544 | ++DOMWINDOW == 69 (0C1B4C00) [pid = 5820] [serial = 83] [outer = 0BFF0000]
10:03:33 INFO - PROCESS | 5544 | --DOMWINDOW == 14 (0F52F400) [pid = 5544] [serial = 22] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
10:03:33 INFO - PROCESS | 5544 | 1477587813266 Marionette TRACE conn5 <- [1,131,null,{"value":["/XMLHttpRequest/event-readystate-sync-open.htm",0,null,null,[["XMLHttpRequest: open() call fires sync readystate event (sync)",0,null,null],["XMLHttpRequest: open() call fires sync readystate event (async)",0,null,null]]]}]
10:03:33 INFO - ..
10:03:33 INFO - TEST-OK | /XMLHttpRequest/event-readystate-sync-open.htm | took 730ms
10:03:33 INFO - PROCESS | 5544 | 1477587813314 Marionette TRACE conn5 -> [0,132,"getWindowHandle",null]
10:03:33 INFO - PROCESS | 5544 | 1477587813318 Marionette TRACE conn5 <- [1,132,null,{"value":"2147483652"}]
10:03:33 INFO - TEST-START | /XMLHttpRequest/event-readystatechange-loaded.htm
10:03:33 INFO - PROCESS | 5544 | 1477587813324 Marionette TRACE conn5 -> [0,133,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:33 INFO - PROCESS | 5544 | 1477587813420 Marionette TRACE conn5 <- [1,133,null,{"value":null}]
10:03:33 INFO - PROCESS | 5544 | 1477587813437 Marionette TRACE conn5 -> [0,134,"getWindowHandles",null]
10:03:33 INFO - PROCESS | 5544 | 1477587813441 Marionette TRACE conn5 <- [1,134,null,["2147483652"]]
10:03:33 INFO - PROCESS | 5544 | 1477587813445 Marionette TRACE conn5 -> [0,135,"switchToWindow",{"name":"2147483652"}]
10:03:33 INFO - PROCESS | 5544 | 1477587813450 Marionette TRACE conn5 <- [1,135,null,{}]
10:03:33 INFO - PROCESS | 5544 | 1477587813454 Marionette TRACE conn5 -> [0,136,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-readystatechange-loaded.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:33 INFO - PROCESS | 5544 | ++DOCSHELL 0C1AFC00 == 7 [pid = 5820] [id = 28]
10:03:33 INFO - PROCESS | 5544 | ++DOMWINDOW == 70 (0C1B1400) [pid = 5820] [serial = 84] [outer = 00000000]
10:03:33 INFO - PROCESS | 5544 | ++DOMWINDOW == 71 (0C85F800) [pid = 5820] [serial = 85] [outer = 0C1B1400]
10:03:33 INFO - PROCESS | 5544 | ++DOMWINDOW == 72 (0CB16400) [pid = 5820] [serial = 86] [outer = 0C1B1400]
10:03:35 INFO - PROCESS | 5544 | --DOCSHELL 0B9FD400 == 6 [pid = 5820] [id = 27]
10:03:35 INFO - PROCESS | 5544 | --DOCSHELL 0B9F0000 == 5 [pid = 5820] [id = 26]
10:03:35 INFO - PROCESS | 5544 | --DOCSHELL 0AC9D400 == 4 [pid = 5820] [id = 25]
10:03:35 INFO - PROCESS | 5544 | --DOCSHELL 0AC93C00 == 3 [pid = 5820] [id = 24]
10:03:35 INFO - PROCESS | 5544 | --DOCSHELL 0BFE8C00 == 2 [pid = 5820] [id = 23]
10:03:35 INFO - PROCESS | 5544 | --DOMWINDOW == 71 (0DADB000) [pid = 5820] [serial = 67] [outer = 00000000] [url = about:blank]
10:03:35 INFO - PROCESS | 5544 | --DOMWINDOW == 70 (0DADD800) [pid = 5820] [serial = 68] [outer = 00000000] [url = about:blank]
10:03:35 INFO - PROCESS | 5544 | --DOMWINDOW == 69 (0D922400) [pid = 5820] [serial = 17] [outer = 00000000] [url = about:blank]
10:03:35 INFO - PROCESS | 5544 | --DOMWINDOW == 68 (0BFEF000) [pid = 5820] [serial = 70] [outer = 00000000] [url = about:blank]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 67 (0B876000) [pid = 5820] [serial = 57] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/data-uri.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 66 (0CC09800) [pid = 5820] [serial = 24] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-open.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 65 (0CB14000) [pid = 5820] [serial = 39] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-listeners.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 64 (0D736400) [pid = 5820] [serial = 33] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-upload.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 63 (0D414000) [pid = 5820] [serial = 30] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-unsent.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 62 (0D733400) [pid = 5820] [serial = 42] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-loadend.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 61 (08F45400) [pid = 5820] [serial = 21] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-done.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 60 (0AE9D000) [pid = 5820] [serial = 63] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-error-order.sub.html]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 59 (0B8D9C00) [pid = 5820] [serial = 54] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/anonymous-mode-unsupported.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 58 (0CF5DC00) [pid = 5820] [serial = 27] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-open.worker]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 57 (0D8B2000) [pid = 5820] [serial = 51] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-loadend.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 56 (0879D400) [pid = 5820] [serial = 18] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-timeout.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 55 (0DAC1C00) [pid = 5820] [serial = 45] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-order.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 54 (08F47000) [pid = 5820] [serial = 36] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-abort.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 53 (0D8AB800) [pid = 5820] [serial = 48] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-abort.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 52 (0B879C00) [pid = 5820] [serial = 60] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-abort.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 51 (0BFF0000) [pid = 5820] [serial = 81] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-readystate-sync-open.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 50 (0B9F0C00) [pid = 5820] [serial = 78] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-progress.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 49 (0AE98000) [pid = 5820] [serial = 75] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-loadstart.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 48 (0AC94000) [pid = 5820] [serial = 72] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-loadend.htm]
10:03:40 INFO - PROCESS | 5544 | --DOMWINDOW == 47 (0BFE9C00) [pid = 5820] [serial = 69] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-load.htm]
10:03:40 INFO - PROCESS | 5544 | 1477587820131 Marionette TRACE conn5 <- [1,136,null,{"value":["/XMLHttpRequest/event-readystatechange-loaded.htm",0,null,null,[["XMLHttpRequest: the LOADING state change should only happen once",1,"assert_equals: LOADING state change may only be emitted once expected 1 but got 10","client.onreadystatechange<@http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm:29:13\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nTest.prototype.step_func/<@http://web-platform.test:8000/resources/testharness.js:1425:20\nEventHandlerNonNull*@http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm:23:33\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\n@http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm:19:1\n"]]]}]
10:03:40 INFO - .
10:03:40 INFO - TEST-OK | /XMLHttpRequest/event-readystatechange-loaded.htm | took 6859ms
10:03:40 INFO - PROCESS | 5544 | 1477587820188 Marionette TRACE conn5 -> [0,137,"getWindowHandle",null]
10:03:40 INFO - PROCESS | 5544 | 1477587820193 Marionette TRACE conn5 <- [1,137,null,{"value":"2147483652"}]
10:03:40 INFO - TEST-START | /XMLHttpRequest/event-timeout-order.htm
10:03:40 INFO - PROCESS | 5544 | 1477587820217 Marionette TRACE conn5 -> [0,138,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:40 INFO - PROCESS | 5544 | 1477587820359 Marionette TRACE conn5 <- [1,138,null,{"value":null}]
10:03:40 INFO - PROCESS | 5544 | 1477587820376 Marionette TRACE conn5 -> [0,139,"getWindowHandles",null]
10:03:40 INFO - PROCESS | 5544 | 1477587820381 Marionette TRACE conn5 <- [1,139,null,["2147483652"]]
10:03:40 INFO - PROCESS | 5544 | 1477587820386 Marionette TRACE conn5 -> [0,140,"switchToWindow",{"name":"2147483652"}]
10:03:40 INFO - PROCESS | 5544 | 1477587820398 Marionette TRACE conn5 <- [1,140,null,{}]
10:03:40 INFO - PROCESS | 5544 | 1477587820402 Marionette TRACE conn5 -> [0,141,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-timeout-order.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-timeout-order.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:40 INFO - PROCESS | 5544 | ++DOCSHELL 0AC9CC00 == 3 [pid = 5820] [id = 29]
10:03:40 INFO - PROCESS | 5544 | ++DOMWINDOW == 48 (0AC9D400) [pid = 5820] [serial = 87] [outer = 00000000]
10:03:40 INFO - PROCESS | 5544 | ++DOMWINDOW == 49 (0AE98400) [pid = 5820] [serial = 88] [outer = 0AC9D400]
10:03:40 INFO - PROCESS | 5544 | ++DOMWINDOW == 50 (0AE9F800) [pid = 5820] [serial = 89] [outer = 0AC9D400]
10:03:40 INFO - PROCESS | 5544 | 1477587820811 Marionette TRACE conn5 <- [1,141,null,{"value":["/XMLHttpRequest/event-timeout-order.htm",0,null,null,[["XMLHttpRequest: event - timeout (order of events)",0,null,null]]]}]
10:03:40 INFO - .
10:03:40 INFO - TEST-OK | /XMLHttpRequest/event-timeout-order.htm | took 670ms
10:03:40 INFO - PROCESS | 5544 | 1477587820873 Marionette TRACE conn5 -> [0,142,"getWindowHandle",null]
10:03:40 INFO - PROCESS | 5544 | 1477587820878 Marionette TRACE conn5 <- [1,142,null,{"value":"2147483652"}]
10:03:40 INFO - TEST-START | /XMLHttpRequest/event-timeout.htm
10:03:40 INFO - PROCESS | 5544 | 1477587820883 Marionette TRACE conn5 -> [0,143,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:40 INFO - PROCESS | 5544 | 1477587820981 Marionette TRACE conn5 <- [1,143,null,{"value":null}]
10:03:41 INFO - PROCESS | 5544 | 1477587821005 Marionette TRACE conn5 -> [0,144,"getWindowHandles",null]
10:03:41 INFO - PROCESS | 5544 | 1477587821008 Marionette TRACE conn5 <- [1,144,null,["2147483652"]]
10:03:41 INFO - PROCESS | 5544 | 1477587821012 Marionette TRACE conn5 -> [0,145,"switchToWindow",{"name":"2147483652"}]
10:03:41 INFO - PROCESS | 5544 | 1477587821016 Marionette TRACE conn5 <- [1,145,null,{}]
10:03:41 INFO - PROCESS | 5544 | 1477587821020 Marionette TRACE conn5 -> [0,146,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-timeout.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-timeout.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:41 INFO - PROCESS | 5544 | ++DOCSHELL 0AE9A800 == 4 [pid = 5820] [id = 30]
10:03:41 INFO - PROCESS | 5544 | ++DOMWINDOW == 51 (0AE9D000) [pid = 5820] [serial = 90] [outer = 00000000]
10:03:41 INFO - PROCESS | 5544 | ++DOMWINDOW == 52 (0B8D8800) [pid = 5820] [serial = 91] [outer = 0AE9D000]
10:03:41 INFO - PROCESS | 5544 | ++DOMWINDOW == 53 (0B8DF400) [pid = 5820] [serial = 92] [outer = 0AE9D000]
10:03:41 INFO - PROCESS | 5544 | 1477587821423 Marionette TRACE conn5 <- [1,146,null,{"value":["/XMLHttpRequest/event-timeout.htm",0,null,null,[["XMLHttpRequest: timeout event",0,null,null]]]}]
10:03:41 INFO - .
10:03:41 INFO - TEST-OK | /XMLHttpRequest/event-timeout.htm | took 570ms
10:03:41 INFO - PROCESS | 5544 | 1477587821463 Marionette TRACE conn5 -> [0,147,"getWindowHandle",null]
10:03:41 INFO - PROCESS | 5544 | 1477587821469 Marionette TRACE conn5 <- [1,147,null,{"value":"2147483652"}]
10:03:41 INFO - PROCESS | 5544 | 1477587821473 Marionette TRACE conn5 -> [0,148,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:41 INFO - TEST-START | /XMLHttpRequest/event-upload-progress-crossorigin.sub.htm
10:03:41 INFO - PROCESS | 5544 | 1477587821562 Marionette TRACE conn5 <- [1,148,null,{"value":null}]
10:03:41 INFO - PROCESS | 5544 | 1477587821581 Marionette TRACE conn5 -> [0,149,"getWindowHandles",null]
10:03:41 INFO - PROCESS | 5544 | 1477587821584 Marionette TRACE conn5 <- [1,149,null,["2147483652"]]
10:03:41 INFO - PROCESS | 5544 | 1477587821588 Marionette TRACE conn5 -> [0,150,"switchToWindow",{"name":"2147483652"}]
10:03:41 INFO - PROCESS | 5544 | 1477587821593 Marionette TRACE conn5 <- [1,150,null,{}]
10:03:41 INFO - PROCESS | 5544 | 1477587821596 Marionette TRACE conn5 -> [0,151,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:41 INFO - PROCESS | 5544 | ++DOCSHELL 0B9FA000 == 5 [pid = 5820] [id = 31]
10:03:41 INFO - PROCESS | 5544 | ++DOMWINDOW == 54 (0B9FC800) [pid = 5820] [serial = 93] [outer = 00000000]
10:03:41 INFO - PROCESS | 5544 | ++DOMWINDOW == 55 (0BFEA800) [pid = 5820] [serial = 94] [outer = 0B9FC800]
10:03:41 INFO - PROCESS | 5544 | ++DOMWINDOW == 56 (0BFEF800) [pid = 5820] [serial = 95] [outer = 0B9FC800]
10:03:42 INFO - PROCESS | 5544 | 1477587822006 Marionette TRACE conn5 <- [1,151,null,{"value":["/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm",0,null,null,[["XMLHttpRequest: upload progress event for cross-origin requests",0,null,null]]]}]
10:03:42 INFO - .
10:03:42 INFO - TEST-OK | /XMLHttpRequest/event-upload-progress-crossorigin.sub.htm | took 570ms
10:03:42 INFO - PROCESS | 5544 | 1477587822048 Marionette TRACE conn5 -> [0,152,"getWindowHandle",null]
10:03:42 INFO - PROCESS | 5544 | 1477587822051 Marionette TRACE conn5 <- [1,152,null,{"value":"2147483652"}]
10:03:42 INFO - TEST-START | /XMLHttpRequest/event-upload-progress.htm
10:03:42 INFO - PROCESS | 5544 | 1477587822055 Marionette TRACE conn5 -> [0,153,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:42 INFO - PROCESS | 5544 | 1477587822131 Marionette TRACE conn5 <- [1,153,null,{"value":null}]
10:03:42 INFO - PROCESS | 5544 | 1477587822147 Marionette TRACE conn5 -> [0,154,"getWindowHandles",null]
10:03:42 INFO - PROCESS | 5544 | 1477587822149 Marionette TRACE conn5 <- [1,154,null,["2147483652"]]
10:03:42 INFO - PROCESS | 5544 | 1477587822152 Marionette TRACE conn5 -> [0,155,"switchToWindow",{"name":"2147483652"}]
10:03:42 INFO - PROCESS | 5544 | 1477587822157 Marionette TRACE conn5 <- [1,155,null,{}]
10:03:42 INFO - PROCESS | 5544 | 1477587822161 Marionette TRACE conn5 -> [0,156,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-upload-progress.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-upload-progress.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:42 INFO - PROCESS | 5544 | ++DOCSHELL 0AC9A400 == 6 [pid = 5820] [id = 32]
10:03:42 INFO - PROCESS | 5544 | ++DOMWINDOW == 57 (0B873400) [pid = 5820] [serial = 96] [outer = 00000000]
10:03:42 INFO - PROCESS | 5544 | ++DOMWINDOW == 58 (0B8D7800) [pid = 5820] [serial = 97] [outer = 0B873400]
10:03:42 INFO - PROCESS | 5544 | ++DOMWINDOW == 59 (0BFE4400) [pid = 5820] [serial = 98] [outer = 0B873400]
10:03:42 INFO - PROCESS | 5544 | 1477587822403 addons.productaddons WARN Failed downloading XML, status: 0, reason: error
10:03:42 INFO - PROCESS | 5544 | 1477587822619 Marionette TRACE conn5 <- [1,156,null,{"value":["/XMLHttpRequest/event-upload-progress.htm",0,null,null,[["XMLHttpRequest: upload progress event",0,null,null]]]}]
10:03:42 INFO - .
10:03:42 INFO - TEST-OK | /XMLHttpRequest/event-upload-progress.htm | took 630ms
10:03:42 INFO - PROCESS | 5544 | 1477587822688 Marionette TRACE conn5 -> [0,157,"getWindowHandle",null]
10:03:42 INFO - PROCESS | 5544 | 1477587822691 Marionette TRACE conn5 <- [1,157,null,{"value":"2147483652"}]
10:03:42 INFO - TEST-START | /XMLHttpRequest/formdata-blob.htm
10:03:42 INFO - PROCESS | 5544 | 1477587822695 Marionette TRACE conn5 -> [0,158,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:42 INFO - PROCESS | 5544 | 1477587822771 Marionette TRACE conn5 <- [1,158,null,{"value":null}]
10:03:42 INFO - PROCESS | 5544 | 1477587822779 Marionette TRACE conn5 -> [0,159,"getWindowHandles",null]
10:03:42 INFO - PROCESS | 5544 | 1477587822782 Marionette TRACE conn5 <- [1,159,null,["2147483652"]]
10:03:42 INFO - PROCESS | 5544 | 1477587822785 Marionette TRACE conn5 -> [0,160,"switchToWindow",{"name":"2147483652"}]
10:03:42 INFO - PROCESS | 5544 | 1477587822789 Marionette TRACE conn5 <- [1,160,null,{}]
10:03:42 INFO - PROCESS | 5544 | 1477587822793 Marionette TRACE conn5 -> [0,161,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-blob.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-blob.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:42 INFO - PROCESS | 5544 | ++DOCSHELL 0B9EF000 == 7 [pid = 5820] [id = 33]
10:03:42 INFO - PROCESS | 5544 | ++DOMWINDOW == 60 (0BFED400) [pid = 5820] [serial = 99] [outer = 00000000]
10:03:42 INFO - PROCESS | 5544 | ++DOMWINDOW == 61 (0CB0EC00) [pid = 5820] [serial = 100] [outer = 0BFED400]
10:03:42 INFO - PROCESS | 5544 | ++DOMWINDOW == 62 (0CCE4800) [pid = 5820] [serial = 101] [outer = 0BFED400]
10:03:43 INFO - PROCESS | 5544 | 1477587823276 Marionette TRACE conn5 <- [1,161,null,{"value":["/XMLHttpRequest/formdata-blob.htm",0,null,null,[["formdata with blob",0,null,null],["formdata with named blob",0,null,null],["formdata.append() should throw if value is string and file name is given",0,null,null]]]}]
10:03:43 INFO - ...
10:03:43 INFO - TEST-OK | /XMLHttpRequest/formdata-blob.htm | took 630ms
10:03:43 INFO - PROCESS | 5544 | 1477587823328 Marionette TRACE conn5 -> [0,162,"getWindowHandle",null]
10:03:43 INFO - PROCESS | 5544 | 1477587823331 Marionette TRACE conn5 <- [1,162,null,{"value":"2147483652"}]
10:03:43 INFO - TEST-START | /XMLHttpRequest/formdata-delete.htm
10:03:43 INFO - PROCESS | 5544 | 1477587823336 Marionette TRACE conn5 -> [0,163,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:43 INFO - PROCESS | 5544 | 1477587823451 Marionette TRACE conn5 <- [1,163,null,{"value":null}]
10:03:43 INFO - PROCESS | 5544 | 1477587823464 Marionette TRACE conn5 -> [0,164,"getWindowHandles",null]
10:03:43 INFO - PROCESS | 5544 | 1477587823467 Marionette TRACE conn5 <- [1,164,null,["2147483652"]]
10:03:43 INFO - PROCESS | 5544 | 1477587823471 Marionette TRACE conn5 -> [0,165,"switchToWindow",{"name":"2147483652"}]
10:03:43 INFO - PROCESS | 5544 | 1477587823474 Marionette TRACE conn5 <- [1,165,null,{}]
10:03:43 INFO - PROCESS | 5544 | 1477587823480 Marionette TRACE conn5 -> [0,166,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-delete.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-delete.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:43 INFO - PROCESS | 5544 | ++DOCSHELL 0AC94800 == 8 [pid = 5820] [id = 34]
10:03:43 INFO - PROCESS | 5544 | ++DOMWINDOW == 63 (0AC9C000) [pid = 5820] [serial = 102] [outer = 00000000]
10:03:43 INFO - PROCESS | 5544 | ++DOMWINDOW == 64 (0AEA0C00) [pid = 5820] [serial = 103] [outer = 0AC9C000]
10:03:43 INFO - PROCESS | 5544 | ++DOMWINDOW == 65 (0B8DA400) [pid = 5820] [serial = 104] [outer = 0AC9C000]
10:03:43 INFO - PROCESS | 5544 | 1477587823949 Marionette TRACE conn5 <- [1,166,null,{"value":["/XMLHttpRequest/formdata-delete.htm",0,null,null,[["testFormDataDelete",0,null,null],["testFormDataDeleteFromForm",0,null,null],["testFormDataDeleteFromFormNonExistentKey",0,null,null],["testFormDataDeleteFromFormOtherKey",0,null,null],["testFormDataDeleteFromEmptyForm",0,null,null],["testFormDataDeleteNonExistentKey",0,null,null],["testFormDataDeleteOtherKey",0,null,null]]]}]
10:03:44 INFO - .......
10:03:44 INFO - TEST-OK | /XMLHttpRequest/formdata-delete.htm | took 671ms
10:03:44 INFO - PROCESS | 5544 | 1477587824009 Marionette TRACE conn5 -> [0,167,"getWindowHandle",null]
10:03:44 INFO - PROCESS | 5544 | 1477587824012 Marionette TRACE conn5 <- [1,167,null,{"value":"2147483652"}]
10:03:44 INFO - TEST-START | /XMLHttpRequest/formdata-foreach.html
10:03:44 INFO - PROCESS | 5544 | 1477587824016 Marionette TRACE conn5 -> [0,168,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:44 INFO - PROCESS | 5544 | 1477587824095 Marionette TRACE conn5 <- [1,168,null,{"value":null}]
10:03:44 INFO - PROCESS | 5544 | 1477587824101 Marionette TRACE conn5 -> [0,169,"getWindowHandles",null]
10:03:44 INFO - PROCESS | 5544 | 1477587824103 Marionette TRACE conn5 <- [1,169,null,["2147483652"]]
10:03:44 INFO - PROCESS | 5544 | 1477587824111 Marionette TRACE conn5 -> [0,170,"switchToWindow",{"name":"2147483652"}]
10:03:44 INFO - PROCESS | 5544 | 1477587824115 Marionette TRACE conn5 <- [1,170,null,{}]
10:03:44 INFO - PROCESS | 5544 | 1477587824121 Marionette TRACE conn5 -> [0,171,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-foreach.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-foreach.html\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:44 INFO - PROCESS | 5544 | ++DOCSHELL 0AC95800 == 9 [pid = 5820] [id = 35]
10:03:44 INFO - PROCESS | 5544 | ++DOMWINDOW == 66 (0AC98000) [pid = 5820] [serial = 105] [outer = 00000000]
10:03:44 INFO - PROCESS | 5544 | ++DOMWINDOW == 67 (0B874000) [pid = 5820] [serial = 106] [outer = 0AC98000]
10:03:44 INFO - PROCESS | 5544 | ++DOMWINDOW == 68 (0B8D9C00) [pid = 5820] [serial = 107] [outer = 0AC98000]
10:03:44 INFO - PROCESS | 5544 | --DOCSHELL 0AE9A800 == 8 [pid = 5820] [id = 30]
10:03:44 INFO - PROCESS | 5544 | --DOCSHELL 0AC9CC00 == 7 [pid = 5820] [id = 29]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 67 (0D411000) [pid = 5820] [serial = 29] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 66 (0DB4A400) [pid = 5820] [serial = 53] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 65 (0D734C00) [pid = 5820] [serial = 32] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 64 (0C852C00) [pid = 5820] [serial = 23] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 63 (0B8DDC00) [pid = 5820] [serial = 55] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 62 (0AC99400) [pid = 5820] [serial = 47] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 61 (0D8B1400) [pid = 5820] [serial = 50] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 60 (0B9FAC00) [pid = 5820] [serial = 61] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 59 (0AC1F800) [pid = 5820] [serial = 38] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 58 (08FD5400) [pid = 5820] [serial = 20] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 57 (0C1B2800) [pid = 5820] [serial = 82] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 56 (0C1B4C00) [pid = 5820] [serial = 83] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 55 (0B9F5C00) [pid = 5820] [serial = 79] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 54 (0B9FBC00) [pid = 5820] [serial = 80] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 53 (0B87B400) [pid = 5820] [serial = 76] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 52 (0B8D3000) [pid = 5820] [serial = 77] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 51 (0AC9D000) [pid = 5820] [serial = 73] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 50 (0ACA1800) [pid = 5820] [serial = 74] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 49 (0DAE1000) [pid = 5820] [serial = 71] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 48 (0C85F800) [pid = 5820] [serial = 85] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 47 (0B87CC00) [pid = 5820] [serial = 59] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 46 (0CC12C00) [pid = 5820] [serial = 25] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 45 (0B87A400) [pid = 5820] [serial = 58] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 44 (0CF58C00) [pid = 5820] [serial = 40] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 43 (0D91B400) [pid = 5820] [serial = 35] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 42 (0D4EC000) [pid = 5820] [serial = 31] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 41 (0DAB8000) [pid = 5820] [serial = 44] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 40 (0AC22400) [pid = 5820] [serial = 22] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 39 (0AEA2800) [pid = 5820] [serial = 64] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 38 (0D920400) [pid = 5820] [serial = 43] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 37 (0B9F4000) [pid = 5820] [serial = 65] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 36 (0B8E1400) [pid = 5820] [serial = 56] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 35 (0D40BC00) [pid = 5820] [serial = 28] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 34 (0DB47C00) [pid = 5820] [serial = 52] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 33 (0D7B3800) [pid = 5820] [serial = 34] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 32 (08F42800) [pid = 5820] [serial = 19] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 31 (0D410400) [pid = 5820] [serial = 41] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 30 (0AC96000) [pid = 5820] [serial = 46] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 29 (087A3800) [pid = 5820] [serial = 37] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 28 (0CCE4000) [pid = 5820] [serial = 26] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 27 (0D8AF400) [pid = 5820] [serial = 49] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | --DOMWINDOW == 26 (0B9FD000) [pid = 5820] [serial = 62] [outer = 00000000] [url = about:blank]
10:03:44 INFO - PROCESS | 5544 | 1477587824511 Marionette TRACE conn5 <- [1,171,null,{"value":["/XMLHttpRequest/formdata-foreach.html",0,null,null,[["Iterator should return duplicate keys and non-deleted values",0,null,null],["Entries iterator should return duplicate keys and non-deleted values",0,null,null],["Keys iterator should return duplicates",0,null,null],["Values iterator should return non-deleted values",0,null,null]]]}]
10:03:44 INFO - ....
10:03:44 INFO - TEST-OK | /XMLHttpRequest/formdata-foreach.html | took 530ms
10:03:44 INFO - PROCESS | 5544 | 1477587824549 Marionette TRACE conn5 -> [0,172,"getWindowHandle",null]
10:03:44 INFO - PROCESS | 5544 | 1477587824551 Marionette TRACE conn5 <- [1,172,null,{"value":"2147483652"}]
10:03:44 INFO - TEST-START | /XMLHttpRequest/formdata-get.htm
10:03:44 INFO - PROCESS | 5544 | 1477587824556 Marionette TRACE conn5 -> [0,173,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:44 INFO - PROCESS | 5544 | 1477587824626 Marionette TRACE conn5 <- [1,173,null,{"value":null}]
10:03:44 INFO - PROCESS | 5544 | 1477587824638 Marionette TRACE conn5 -> [0,174,"getWindowHandles",null]
10:03:44 INFO - PROCESS | 5544 | 1477587824640 Marionette TRACE conn5 <- [1,174,null,["2147483652"]]
10:03:44 INFO - PROCESS | 5544 | 1477587824644 Marionette TRACE conn5 -> [0,175,"switchToWindow",{"name":"2147483652"}]
10:03:44 INFO - PROCESS | 5544 | 1477587824648 Marionette TRACE conn5 <- [1,175,null,{}]
10:03:44 INFO - PROCESS | 5544 | 1477587824652 Marionette TRACE conn5 -> [0,176,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-get.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-get.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:44 INFO - PROCESS | 5544 | ++DOCSHELL 0AC9CC00 == 8 [pid = 5820] [id = 36]
10:03:44 INFO - PROCESS | 5544 | ++DOMWINDOW == 27 (0AC9DC00) [pid = 5820] [serial = 108] [outer = 00000000]
10:03:44 INFO - PROCESS | 5544 | ++DOMWINDOW == 28 (0B879400) [pid = 5820] [serial = 109] [outer = 0AC9DC00]
10:03:44 INFO - PROCESS | 5544 | ++DOMWINDOW == 29 (0B87F000) [pid = 5820] [serial = 110] [outer = 0AC9DC00]
10:03:45 INFO - PROCESS | 5544 | 1477587825046 Marionette TRACE conn5 <- [1,176,null,{"value":["/XMLHttpRequest/formdata-get.htm",0,null,null,[["testFormDataGet",0,null,null],["testFormDataGetFromForm",0,null,null],["testFormDataGetFromFormNull",0,null,null],["testFormDataGetFromEmptyForm",0,null,null],["testFormDataGetNull1",0,null,null],["testFormDataGetNull2",0,null,null],["testFormDataGetAll",0,null,null],["testFormDataGetAllEmpty1",0,null,null],["testFormDataGetAllEmpty2",0,null,null],["testFormDataGetAllFromForm",0,null,null],["testFormDataGetAllFromFormNull",0,null,null],["testFormDataGetAllFromEmptyForm",0,null,null]]]}]
10:03:45 INFO - ............
10:03:45 INFO - TEST-OK | /XMLHttpRequest/formdata-get.htm | took 531ms
10:03:45 INFO - PROCESS | 5544 | 1477587825090 Marionette TRACE conn5 -> [0,177,"getWindowHandle",null]
10:03:45 INFO - PROCESS | 5544 | 1477587825092 Marionette TRACE conn5 <- [1,177,null,{"value":"2147483652"}]
10:03:45 INFO - PROCESS | 5544 | 1477587825096 Marionette TRACE conn5 -> [0,178,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:45 INFO - TEST-START | /XMLHttpRequest/formdata-has.htm
10:03:45 INFO - PROCESS | 5544 | 1477587825175 Marionette TRACE conn5 <- [1,178,null,{"value":null}]
10:03:45 INFO - PROCESS | 5544 | 1477587825186 Marionette TRACE conn5 -> [0,179,"getWindowHandles",null]
10:03:45 INFO - PROCESS | 5544 | 1477587825188 Marionette TRACE conn5 <- [1,179,null,["2147483652"]]
10:03:45 INFO - PROCESS | 5544 | 1477587825191 Marionette TRACE conn5 -> [0,180,"switchToWindow",{"name":"2147483652"}]
10:03:45 INFO - PROCESS | 5544 | 1477587825195 Marionette TRACE conn5 <- [1,180,null,{}]
10:03:45 INFO - PROCESS | 5544 | 1477587825198 Marionette TRACE conn5 -> [0,181,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-has.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-has.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:45 INFO - PROCESS | 5544 | ++DOCSHELL 0B9FD800 == 9 [pid = 5820] [id = 37]
10:03:45 INFO - PROCESS | 5544 | ++DOMWINDOW == 30 (0BFE3000) [pid = 5820] [serial = 111] [outer = 00000000]
10:03:45 INFO - PROCESS | 5544 | ++DOMWINDOW == 31 (0C1AF400) [pid = 5820] [serial = 112] [outer = 0BFE3000]
10:03:45 INFO - PROCESS | 5544 | ++DOMWINDOW == 32 (0C1B6000) [pid = 5820] [serial = 113] [outer = 0BFE3000]
10:03:45 INFO - PROCESS | 5544 | 1477587825562 Marionette TRACE conn5 <- [1,181,null,{"value":["/XMLHttpRequest/formdata-has.htm",0,null,null,[["testFormDataHas",0,null,null],["testFormDataHasFromForm",0,null,null],["testFormDataHasFromFormNull",0,null,null],["testFormDataHasFromEmptyForm",0,null,null],["testFormDataHasEmpty1",0,null,null],["testFormDataHasEmpty2",0,null,null]]]}]
10:03:45 INFO - ......
10:03:45 INFO - TEST-OK | /XMLHttpRequest/formdata-has.htm | took 512ms
10:03:45 INFO - PROCESS | 5544 | 1477587825617 Marionette TRACE conn5 -> [0,182,"getWindowHandle",null]
10:03:45 INFO - PROCESS | 5544 | 1477587825619 Marionette TRACE conn5 <- [1,182,null,{"value":"2147483652"}]
10:03:45 INFO - TEST-START | /XMLHttpRequest/formdata-set.htm
10:03:45 INFO - PROCESS | 5544 | 1477587825624 Marionette TRACE conn5 -> [0,183,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:45 INFO - PROCESS | 5544 | 1477587825691 Marionette TRACE conn5 <- [1,183,null,{"value":null}]
10:03:45 INFO - PROCESS | 5544 | 1477587825705 Marionette TRACE conn5 -> [0,184,"getWindowHandles",null]
10:03:45 INFO - PROCESS | 5544 | 1477587825707 Marionette TRACE conn5 <- [1,184,null,["2147483652"]]
10:03:45 INFO - PROCESS | 5544 | 1477587825711 Marionette TRACE conn5 -> [0,185,"switchToWindow",{"name":"2147483652"}]
10:03:45 INFO - PROCESS | 5544 | 1477587825715 Marionette TRACE conn5 <- [1,185,null,{}]
10:03:45 INFO - PROCESS | 5544 | 1477587825719 Marionette TRACE conn5 -> [0,186,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-set.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-set.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:45 INFO - PROCESS | 5544 | ++DOCSHELL 0C921800 == 10 [pid = 5820] [id = 38]
10:03:45 INFO - PROCESS | 5544 | ++DOMWINDOW == 33 (0C923800) [pid = 5820] [serial = 114] [outer = 00000000]
10:03:45 INFO - PROCESS | 5544 | ++DOMWINDOW == 34 (0CCE2400) [pid = 5820] [serial = 115] [outer = 0C923800]
10:03:45 INFO - PROCESS | 5544 | ++DOMWINDOW == 35 (0CF58C00) [pid = 5820] [serial = 116] [outer = 0C923800]
10:03:46 INFO - PROCESS | 5544 | 1477587826163 Marionette TRACE conn5 <- [1,186,null,{"value":["/XMLHttpRequest/formdata-set.htm",0,null,null,[["Passing a String object to FormData.set should work",0,null,null],["testFormDataSet1",0,null,null],["testFormDataSet2",0,null,null],["testFormDataSetUndefined1",0,null,null],["testFormDataSetUndefined2",0,null,null],["testFormDataSetNull1",0,null,null],["testFormDataSetNull2",0,null,null],["testFormDataSetToForm1",0,null,null],["testFormDataSetToForm2",0,null,null],["testFormDataSetToFormUndefined1",0,null,null],["testFormDataSetToFormUndefined2",0,null,null],["testFormDataSetToFormNull1",0,null,null],["testFormDataSetToFormNull2",0,null,null],["testFormDataSetEmptyBlob",0,null,null]]]}]
10:03:46 INFO - ..............
10:03:46 INFO - TEST-OK | /XMLHttpRequest/formdata-set.htm | took 571ms
10:03:46 INFO - PROCESS | 5544 | 1477587826199 Marionette TRACE conn5 -> [0,187,"getWindowHandle",null]
10:03:46 INFO - PROCESS | 5544 | 1477587826205 Marionette TRACE conn5 <- [1,187,null,{"value":"2147483652"}]
10:03:46 INFO - TEST-START | /XMLHttpRequest/formdata.htm
10:03:46 INFO - PROCESS | 5544 | 1477587826213 Marionette TRACE conn5 -> [0,188,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:46 INFO - PROCESS | 5544 | 1477587826318 Marionette TRACE conn5 <- [1,188,null,{"value":null}]
10:03:46 INFO - PROCESS | 5544 | 1477587826351 Marionette TRACE conn5 -> [0,189,"getWindowHandles",null]
10:03:46 INFO - PROCESS | 5544 | 1477587826361 Marionette TRACE conn5 <- [1,189,null,["2147483652"]]
10:03:46 INFO - PROCESS | 5544 | 1477587826366 Marionette TRACE conn5 -> [0,190,"switchToWindow",{"name":"2147483652"}]
10:03:46 INFO - PROCESS | 5544 | 1477587826372 Marionette TRACE conn5 <- [1,190,null,{}]
10:03:46 INFO - PROCESS | 5544 | 1477587826377 Marionette TRACE conn5 -> [0,191,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:46 INFO - PROCESS | 5544 | ++DOCSHELL 0C925C00 == 11 [pid = 5820] [id = 39]
10:03:46 INFO - PROCESS | 5544 | ++DOMWINDOW == 36 (0C927000) [pid = 5820] [serial = 117] [outer = 00000000]
10:03:46 INFO - PROCESS | 5544 | ++DOMWINDOW == 37 (0D4E2C00) [pid = 5820] [serial = 118] [outer = 0C927000]
10:03:46 INFO - PROCESS | 5544 | ++DOMWINDOW == 38 (0D4E7800) [pid = 5820] [serial = 119] [outer = 0C927000]
10:03:46 INFO - PROCESS | 5544 | 1477587826903 Marionette TRACE conn5 <- [1,191,null,{"value":["/XMLHttpRequest/formdata.htm",0,null,null,[["empty formdata",0,null,null],["formdata with string",0,null,null],["formdata with named string",0,null,null],["formdata from form",0,null,null]]]}]
10:03:46 INFO - ....
10:03:46 INFO - TEST-OK | /XMLHttpRequest/formdata.htm | took 730ms
10:03:46 INFO - PROCESS | 5544 | 1477587826944 Marionette TRACE conn5 -> [0,192,"getWindowHandle",null]
10:03:46 INFO - PROCESS | 5544 | 1477587826948 Marionette TRACE conn5 <- [1,192,null,{"value":"2147483652"}]
10:03:46 INFO - TEST-START | /XMLHttpRequest/getallresponseheaders-cookies.htm
10:03:46 INFO - PROCESS | 5544 | 1477587826953 Marionette TRACE conn5 -> [0,193,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:47 INFO - PROCESS | 5544 | 1477587827055 Marionette TRACE conn5 <- [1,193,null,{"value":null}]
10:03:47 INFO - PROCESS | 5544 | 1477587827089 Marionette TRACE conn5 -> [0,194,"getWindowHandles",null]
10:03:47 INFO - PROCESS | 5544 | 1477587827092 Marionette TRACE conn5 <- [1,194,null,["2147483652"]]
10:03:47 INFO - PROCESS | 5544 | 1477587827096 Marionette TRACE conn5 -> [0,195,"switchToWindow",{"name":"2147483652"}]
10:03:47 INFO - PROCESS | 5544 | 1477587827101 Marionette TRACE conn5 <- [1,195,null,{}]
10:03:47 INFO - PROCESS | 5544 | 1477587827105 Marionette TRACE conn5 -> [0,196,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getallresponseheaders-cookies.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-cookies.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:47 INFO - PROCESS | 5544 | ++DOCSHELL 0D4E2400 == 12 [pid = 5820] [id = 40]
10:03:47 INFO - PROCESS | 5544 | ++DOMWINDOW == 39 (0D4E3000) [pid = 5820] [serial = 120] [outer = 00000000]
10:03:47 INFO - PROCESS | 5544 | ++DOMWINDOW == 40 (0D7AFC00) [pid = 5820] [serial = 121] [outer = 0D4E3000]
10:03:47 INFO - PROCESS | 5544 | ++DOMWINDOW == 41 (0D7B4400) [pid = 5820] [serial = 122] [outer = 0D4E3000]
10:03:47 INFO - PROCESS | 5544 | --DOMWINDOW == 40 (0C1B1400) [pid = 5820] [serial = 84] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm]
10:03:47 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:47 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:47 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:47 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:47 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:47 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:47 INFO - PROCESS | 5544 | 1477587827569 Marionette TRACE conn5 <- [1,196,null,{"value":["/XMLHttpRequest/getallresponseheaders-cookies.htm",0,null,null,[["XMLHttpRequest: getAllResponseHeaders() excludes cookies",0,null,null]]]}]
10:03:47 INFO - .
10:03:47 INFO - TEST-OK | /XMLHttpRequest/getallresponseheaders-cookies.htm | took 670ms
10:03:47 INFO - PROCESS | 5544 | 1477587827635 Marionette TRACE conn5 -> [0,197,"getWindowHandle",null]
10:03:47 INFO - PROCESS | 5544 | 1477587827640 Marionette TRACE conn5 <- [1,197,null,{"value":"2147483652"}]
10:03:47 INFO - TEST-START | /XMLHttpRequest/getallresponseheaders-status.htm
10:03:47 INFO - PROCESS | 5544 | 1477587827647 Marionette TRACE conn5 -> [0,198,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:47 INFO - PROCESS | 5544 | 1477587827737 Marionette TRACE conn5 <- [1,198,null,{"value":null}]
10:03:47 INFO - PROCESS | 5544 | 1477587827752 Marionette TRACE conn5 -> [0,199,"getWindowHandles",null]
10:03:47 INFO - PROCESS | 5544 | 1477587827756 Marionette TRACE conn5 <- [1,199,null,["2147483652"]]
10:03:47 INFO - PROCESS | 5544 | 1477587827762 Marionette TRACE conn5 -> [0,200,"switchToWindow",{"name":"2147483652"}]
10:03:47 INFO - PROCESS | 5544 | 1477587827766 Marionette TRACE conn5 <- [1,200,null,{}]
10:03:47 INFO - PROCESS | 5544 | 1477587827770 Marionette TRACE conn5 -> [0,201,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getallresponseheaders-status.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-status.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:47 INFO - PROCESS | 5544 | ++DOCSHELL 0D7B0000 == 13 [pid = 5820] [id = 41]
10:03:47 INFO - PROCESS | 5544 | ++DOMWINDOW == 41 (0D7B5400) [pid = 5820] [serial = 123] [outer = 00000000]
10:03:47 INFO - PROCESS | 5544 | ++DOMWINDOW == 42 (0D8B0000) [pid = 5820] [serial = 124] [outer = 0D7B5400]
10:03:47 INFO - PROCESS | 5544 | ++DOMWINDOW == 43 (0D8B2800) [pid = 5820] [serial = 125] [outer = 0D7B5400]
10:03:48 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:48 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:48 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:48 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:48 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:48 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:48 INFO - PROCESS | 5544 | 1477587828124 Marionette TRACE conn5 <- [1,201,null,{"value":["/XMLHttpRequest/getallresponseheaders-status.htm",0,null,null,[["XMLHttpRequest: getAllResponseHeaders() excludes status",0,null,null]]]}]
10:03:48 INFO - .
10:03:48 INFO - TEST-OK | /XMLHttpRequest/getallresponseheaders-status.htm | took 510ms
10:03:48 INFO - PROCESS | 5544 | 1477587828161 Marionette TRACE conn5 -> [0,202,"getWindowHandle",null]
10:03:48 INFO - PROCESS | 5544 | 1477587828165 Marionette TRACE conn5 <- [1,202,null,{"value":"2147483652"}]
10:03:48 INFO - TEST-START | /XMLHttpRequest/getresponseheader-case-insensitive.htm
10:03:48 INFO - PROCESS | 5544 | 1477587828175 Marionette TRACE conn5 -> [0,203,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:48 INFO - PROCESS | 5544 | 1477587828261 Marionette TRACE conn5 <- [1,203,null,{"value":null}]
10:03:48 INFO - PROCESS | 5544 | 1477587828274 Marionette TRACE conn5 -> [0,204,"getWindowHandles",null]
10:03:48 INFO - PROCESS | 5544 | 1477587828276 Marionette TRACE conn5 <- [1,204,null,["2147483652"]]
10:03:48 INFO - PROCESS | 5544 | 1477587828283 Marionette TRACE conn5 -> [0,205,"switchToWindow",{"name":"2147483652"}]
10:03:48 INFO - PROCESS | 5544 | 1477587828287 Marionette TRACE conn5 <- [1,205,null,{}]
10:03:48 INFO - PROCESS | 5544 | 1477587828291 Marionette TRACE conn5 -> [0,206,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-case-insensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-case-insensitive.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:48 INFO - PROCESS | 5544 | ++DOCSHELL 0D8AF800 == 14 [pid = 5820] [id = 42]
10:03:48 INFO - PROCESS | 5544 | ++DOMWINDOW == 44 (0D8B0400) [pid = 5820] [serial = 126] [outer = 00000000]
10:03:48 INFO - PROCESS | 5544 | ++DOMWINDOW == 45 (0D91DC00) [pid = 5820] [serial = 127] [outer = 0D8B0400]
10:03:48 INFO - PROCESS | 5544 | ++DOMWINDOW == 46 (0D91EC00) [pid = 5820] [serial = 128] [outer = 0D8B0400]
10:03:48 INFO - PROCESS | 5544 | 1477587828654 Marionette TRACE conn5 <- [1,206,null,{"value":["/XMLHttpRequest/getresponseheader-case-insensitive.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() case-insensitive matching",0,null,null]]]}]
10:03:48 INFO - .
10:03:48 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-case-insensitive.htm | took 530ms
10:03:48 INFO - PROCESS | 5544 | 1477587828712 Marionette TRACE conn5 -> [0,207,"getWindowHandle",null]
10:03:48 INFO - PROCESS | 5544 | 1477587828718 Marionette TRACE conn5 <- [1,207,null,{"value":"2147483652"}]
10:03:48 INFO - TEST-START | /XMLHttpRequest/getresponseheader-chunked-trailer.htm
10:03:48 INFO - PROCESS | 5544 | 1477587828723 Marionette TRACE conn5 -> [0,208,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:48 INFO - PROCESS | 5544 | 1477587828796 Marionette TRACE conn5 <- [1,208,null,{"value":null}]
10:03:48 INFO - PROCESS | 5544 | 1477587828814 Marionette TRACE conn5 -> [0,209,"getWindowHandles",null]
10:03:48 INFO - PROCESS | 5544 | 1477587828817 Marionette TRACE conn5 <- [1,209,null,["2147483652"]]
10:03:48 INFO - PROCESS | 5544 | 1477587828830 Marionette TRACE conn5 -> [0,210,"switchToWindow",{"name":"2147483652"}]
10:03:48 INFO - PROCESS | 5544 | 1477587828835 Marionette TRACE conn5 <- [1,210,null,{}]
10:03:48 INFO - PROCESS | 5544 | 1477587828839 Marionette TRACE conn5 -> [0,211,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-chunked-trailer.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-chunked-trailer.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:48 INFO - PROCESS | 5544 | ++DOCSHELL 0D91D400 == 15 [pid = 5820] [id = 43]
10:03:48 INFO - PROCESS | 5544 | ++DOMWINDOW == 47 (0D91F000) [pid = 5820] [serial = 129] [outer = 00000000]
10:03:48 INFO - PROCESS | 5544 | ++DOMWINDOW == 48 (0DAB6C00) [pid = 5820] [serial = 130] [outer = 0D91F000]
10:03:49 INFO - PROCESS | 5544 | ++DOMWINDOW == 49 (0DAB9000) [pid = 5820] [serial = 131] [outer = 0D91F000]
10:03:49 INFO - PROCESS | 5544 | 1477587829212 Marionette TRACE conn5 <- [1,211,null,{"value":["/XMLHttpRequest/getresponseheader-chunked-trailer.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() and HTTP trailer",0,null,null]]]}]
10:03:49 INFO - .
10:03:49 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-chunked-trailer.htm | took 530ms
10:03:49 INFO - PROCESS | 5544 | 1477587829252 Marionette TRACE conn5 -> [0,212,"getWindowHandle",null]
10:03:49 INFO - PROCESS | 5544 | 1477587829255 Marionette TRACE conn5 <- [1,212,null,{"value":"2147483652"}]
10:03:49 INFO - TEST-START | /XMLHttpRequest/getresponseheader-cookies-and-more.htm
10:03:49 INFO - PROCESS | 5544 | 1477587829259 Marionette TRACE conn5 -> [0,213,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:49 INFO - PROCESS | 5544 | 1477587829349 Marionette TRACE conn5 <- [1,213,null,{"value":null}]
10:03:49 INFO - PROCESS | 5544 | 1477587829366 Marionette TRACE conn5 -> [0,214,"getWindowHandles",null]
10:03:49 INFO - PROCESS | 5544 | 1477587829369 Marionette TRACE conn5 <- [1,214,null,["2147483652"]]
10:03:49 INFO - PROCESS | 5544 | 1477587829372 Marionette TRACE conn5 -> [0,215,"switchToWindow",{"name":"2147483652"}]
10:03:49 INFO - PROCESS | 5544 | 1477587829376 Marionette TRACE conn5 <- [1,215,null,{}]
10:03:49 INFO - PROCESS | 5544 | 1477587829380 Marionette TRACE conn5 -> [0,216,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-cookies-and-more.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-cookies-and-more.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:49 INFO - PROCESS | 5544 | ++DOCSHELL 0DAB6400 == 16 [pid = 5820] [id = 44]
10:03:49 INFO - PROCESS | 5544 | ++DOMWINDOW == 50 (0DAB7000) [pid = 5820] [serial = 132] [outer = 00000000]
10:03:49 INFO - PROCESS | 5544 | ++DOMWINDOW == 51 (0DAD3000) [pid = 5820] [serial = 133] [outer = 0DAB7000]
10:03:49 INFO - PROCESS | 5544 | ++DOMWINDOW == 52 (0DAD5400) [pid = 5820] [serial = 134] [outer = 0DAB7000]
10:03:49 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:49 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:49 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:49 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:49 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:49 INFO - PROCESS | 5544 | [Child 5820] WARNING: blocked access to response header: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
10:03:49 INFO - PROCESS | 5544 | 1477587829729 Marionette TRACE conn5 <- [1,216,null,{"value":["/XMLHttpRequest/getresponseheader-cookies-and-more.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() custom/non-existent headers and cookies",0,null,null]]]}]
10:03:49 INFO - .
10:03:49 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-cookies-and-more.htm | took 530ms
10:03:49 INFO - PROCESS | 5544 | 1477587829792 Marionette TRACE conn5 -> [0,217,"getWindowHandle",null]
10:03:49 INFO - PROCESS | 5544 | 1477587829795 Marionette TRACE conn5 <- [1,217,null,{"value":"2147483652"}]
10:03:49 INFO - TEST-START | /XMLHttpRequest/getresponseheader-error-state.htm
10:03:49 INFO - PROCESS | 5544 | 1477587829804 Marionette TRACE conn5 -> [0,218,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:49 INFO - PROCESS | 5544 | 1477587829872 Marionette TRACE conn5 <- [1,218,null,{"value":null}]
10:03:49 INFO - PROCESS | 5544 | 1477587829883 Marionette TRACE conn5 -> [0,219,"getWindowHandles",null]
10:03:49 INFO - PROCESS | 5544 | 1477587829885 Marionette TRACE conn5 <- [1,219,null,["2147483652"]]
10:03:49 INFO - PROCESS | 5544 | 1477587829890 Marionette TRACE conn5 -> [0,220,"switchToWindow",{"name":"2147483652"}]
10:03:49 INFO - PROCESS | 5544 | 1477587829893 Marionette TRACE conn5 <- [1,220,null,{}]
10:03:49 INFO - PROCESS | 5544 | 1477587829897 Marionette TRACE conn5 -> [0,221,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-error-state.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-error-state.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:49 INFO - PROCESS | 5544 | ++DOCSHELL 0DAD8C00 == 17 [pid = 5820] [id = 45]
10:03:49 INFO - PROCESS | 5544 | ++DOMWINDOW == 53 (0DAD9000) [pid = 5820] [serial = 135] [outer = 00000000]
10:03:50 INFO - PROCESS | 5544 | ++DOMWINDOW == 54 (0DB42800) [pid = 5820] [serial = 136] [outer = 0DAD9000]
10:03:50 INFO - PROCESS | 5544 | ++DOMWINDOW == 55 (0DB48400) [pid = 5820] [serial = 137] [outer = 0DAD9000]
10:03:50 INFO - PROCESS | 5544 | 1477587830288 Marionette TRACE conn5 <- [1,221,null,{"value":["/XMLHttpRequest/getresponseheader-error-state.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() in error state (failing cross-origin test)",0,null,null]]]}]
10:03:50 INFO - .
10:03:50 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-error-state.htm | took 510ms
10:03:50 INFO - PROCESS | 5544 | 1477587830317 Marionette TRACE conn5 -> [0,222,"getWindowHandle",null]
10:03:50 INFO - PROCESS | 5544 | 1477587830319 Marionette TRACE conn5 <- [1,222,null,{"value":"2147483652"}]
10:03:50 INFO - TEST-START | /XMLHttpRequest/getresponseheader-server-date.htm
10:03:50 INFO - PROCESS | 5544 | 1477587830328 Marionette TRACE conn5 -> [0,223,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:50 INFO - PROCESS | 5544 | 1477587830409 Marionette TRACE conn5 <- [1,223,null,{"value":null}]
10:03:50 INFO - PROCESS | 5544 | 1477587830431 Marionette TRACE conn5 -> [0,224,"getWindowHandles",null]
10:03:50 INFO - PROCESS | 5544 | 1477587830434 Marionette TRACE conn5 <- [1,224,null,["2147483652"]]
10:03:50 INFO - PROCESS | 5544 | 1477587830437 Marionette TRACE conn5 -> [0,225,"switchToWindow",{"name":"2147483652"}]
10:03:50 INFO - PROCESS | 5544 | 1477587830440 Marionette TRACE conn5 <- [1,225,null,{}]
10:03:50 INFO - PROCESS | 5544 | 1477587830444 Marionette TRACE conn5 -> [0,226,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-server-date.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-server-date.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:50 INFO - PROCESS | 5544 | ++DOCSHELL 0DAE0400 == 18 [pid = 5820] [id = 46]
10:03:50 INFO - PROCESS | 5544 | ++DOMWINDOW == 56 (0DB41C00) [pid = 5820] [serial = 138] [outer = 00000000]
10:03:50 INFO - PROCESS | 5544 | ++DOMWINDOW == 57 (0DDC9C00) [pid = 5820] [serial = 139] [outer = 0DB41C00]
10:03:50 INFO - PROCESS | 5544 | ++DOMWINDOW == 58 (0DDCC000) [pid = 5820] [serial = 140] [outer = 0DB41C00]
10:03:50 INFO - PROCESS | 5544 | 1477587830846 Marionette TRACE conn5 <- [1,226,null,{"value":["/XMLHttpRequest/getresponseheader-server-date.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() server and date",0,null,null]]]}]
10:03:50 INFO - .
10:03:50 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-server-date.htm | took 571ms
10:03:50 INFO - PROCESS | 5544 | 1477587830903 Marionette TRACE conn5 -> [0,227,"getWindowHandle",null]
10:03:50 INFO - PROCESS | 5544 | 1477587830905 Marionette TRACE conn5 <- [1,227,null,{"value":"2147483652"}]
10:03:50 INFO - TEST-START | /XMLHttpRequest/getresponseheader-special-characters.htm
10:03:50 INFO - PROCESS | 5544 | 1477587830910 Marionette TRACE conn5 -> [0,228,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:50 INFO - PROCESS | 5544 | 1477587830979 Marionette TRACE conn5 <- [1,228,null,{"value":null}]
10:03:51 INFO - PROCESS | 5544 | 1477587830993 Marionette TRACE conn5 -> [0,229,"getWindowHandles",null]
10:03:51 INFO - PROCESS | 5544 | 1477587830995 Marionette TRACE conn5 <- [1,229,null,["2147483652"]]
10:03:51 INFO - PROCESS | 5544 | 1477587830998 Marionette TRACE conn5 -> [0,230,"switchToWindow",{"name":"2147483652"}]
10:03:51 INFO - PROCESS | 5544 | 1477587831002 Marionette TRACE conn5 <- [1,230,null,{}]
10:03:51 INFO - PROCESS | 5544 | 1477587831005 Marionette TRACE conn5 -> [0,231,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-special-characters.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-special-characters.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:51 INFO - PROCESS | 5544 | ++DOCSHELL 0ACA2800 == 19 [pid = 5820] [id = 47]
10:03:51 INFO - PROCESS | 5544 | ++DOMWINDOW == 59 (0AE95800) [pid = 5820] [serial = 141] [outer = 00000000]
10:03:51 INFO - PROCESS | 5544 | ++DOMWINDOW == 60 (0B8DC400) [pid = 5820] [serial = 142] [outer = 0AE95800]
10:03:51 INFO - PROCESS | 5544 | ++DOMWINDOW == 61 (0B9FB800) [pid = 5820] [serial = 143] [outer = 0AE95800]
10:03:51 INFO - PROCESS | 5544 | 1477587831463 Marionette TRACE conn5 <- [1,231,null,{"value":["/XMLHttpRequest/getresponseheader-special-characters.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() funny characters",0,null,null]]]}]
10:03:51 INFO - .
10:03:51 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-special-characters.htm | took 570ms
10:03:51 INFO - PROCESS | 5544 | 1477587831483 Marionette TRACE conn5 -> [0,232,"getWindowHandle",null]
10:03:51 INFO - PROCESS | 5544 | 1477587831485 Marionette TRACE conn5 <- [1,232,null,{"value":"2147483652"}]
10:03:51 INFO - TEST-START | /XMLHttpRequest/getresponseheader-unsent-opened-state.htm
10:03:51 INFO - PROCESS | 5544 | 1477587831489 Marionette TRACE conn5 -> [0,233,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:51 INFO - PROCESS | 5544 | 1477587831564 Marionette TRACE conn5 <- [1,233,null,{"value":null}]
10:03:51 INFO - PROCESS | 5544 | 1477587831577 Marionette TRACE conn5 -> [0,234,"getWindowHandles",null]
10:03:51 INFO - PROCESS | 5544 | 1477587831580 Marionette TRACE conn5 <- [1,234,null,["2147483652"]]
10:03:51 INFO - PROCESS | 5544 | 1477587831583 Marionette TRACE conn5 -> [0,235,"switchToWindow",{"name":"2147483652"}]
10:03:51 INFO - PROCESS | 5544 | 1477587831587 Marionette TRACE conn5 <- [1,235,null,{}]
10:03:51 INFO - PROCESS | 5544 | 1477587831590 Marionette TRACE conn5 -> [0,236,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-unsent-opened-state.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-unsent-opened-state.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:51 INFO - PROCESS | 5544 | ++DOCSHELL 0B8DE400 == 20 [pid = 5820] [id = 48]
10:03:51 INFO - PROCESS | 5544 | ++DOMWINDOW == 62 (0B9FAC00) [pid = 5820] [serial = 144] [outer = 00000000]
10:03:51 INFO - PROCESS | 5544 | ++DOMWINDOW == 63 (0D4DD400) [pid = 5820] [serial = 145] [outer = 0B9FAC00]
10:03:51 INFO - PROCESS | 5544 | ++DOMWINDOW == 64 (0D732400) [pid = 5820] [serial = 146] [outer = 0B9FAC00]
10:03:52 INFO - PROCESS | 5544 | 1477587832192 Marionette TRACE conn5 <- [1,236,null,{"value":["/XMLHttpRequest/getresponseheader-unsent-opened-state.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() in unsent, opened states",0,null,null]]]}]
10:03:52 INFO - .
10:03:52 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-unsent-opened-state.htm | took 710ms
10:03:52 INFO - PROCESS | 5544 | 1477587832203 Marionette TRACE conn5 -> [0,237,"getWindowHandle",null]
10:03:52 INFO - PROCESS | 5544 | 1477587832205 Marionette TRACE conn5 <- [1,237,null,{"value":"2147483652"}]
10:03:52 INFO - PROCESS | 5544 | 1477587832209 Marionette TRACE conn5 -> [0,238,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:52 INFO - TEST-START | /XMLHttpRequest/headers-normalize-response.htm
10:03:52 INFO - PROCESS | 5544 | 1477587832279 Marionette TRACE conn5 <- [1,238,null,{"value":null}]
10:03:52 INFO - PROCESS | 5544 | 1477587832293 Marionette TRACE conn5 -> [0,239,"getWindowHandles",null]
10:03:52 INFO - PROCESS | 5544 | 1477587832295 Marionette TRACE conn5 <- [1,239,null,["2147483652"]]
10:03:52 INFO - PROCESS | 5544 | 1477587832298 Marionette TRACE conn5 -> [0,240,"switchToWindow",{"name":"2147483652"}]
10:03:52 INFO - PROCESS | 5544 | 1477587832302 Marionette TRACE conn5 <- [1,240,null,{}]
10:03:52 INFO - PROCESS | 5544 | 1477587832306 Marionette TRACE conn5 -> [0,241,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/headers-normalize-response.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/headers-normalize-response.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:52 INFO - PROCESS | 5544 | ++DOCSHELL 087A0C00 == 21 [pid = 5820] [id = 49]
10:03:52 INFO - PROCESS | 5544 | ++DOMWINDOW == 65 (087A6000) [pid = 5820] [serial = 147] [outer = 00000000]
10:03:52 INFO - PROCESS | 5544 | ++DOMWINDOW == 66 (0AE9A400) [pid = 5820] [serial = 148] [outer = 087A6000]
10:03:52 INFO - PROCESS | 5544 | ++DOMWINDOW == 67 (0B878000) [pid = 5820] [serial = 149] [outer = 087A6000]
10:03:52 INFO - PROCESS | 5544 | 1477587832877 Marionette TRACE conn5 <- [1,241,null,{"value":["/XMLHttpRequest/headers-normalize-response.htm",0,null,null,[["Header value: hello_world\\0",0,null,null],["Header value: \\0hello_world",0,null,null],["Header value: hello\\0world",0,null,null],["Header value: __hello_world",0,null,null],["Header value: hello_world__",0,null,null],["Header value: __hello_world__",0,null,null],["Header value: [tab]hello_world",0,null,null],["Header value: hello_world[tab]",0,null,null],["Header value: [tab]hello_world[tab]",0,null,null],["Header value: hello______world",0,null,null],["Header value: hello[tab]world",0,null,null],["Header value: \\0",0,null,null],["Header value: ___",0,null,null],["Header value: [tab]",0,null,null],["Header value: ",0,null,null]]]}]
10:03:52 INFO - ...............
10:03:52 INFO - TEST-OK | /XMLHttpRequest/headers-normalize-response.htm | took 711ms
10:03:52 INFO - PROCESS | 5544 | 1477587832924 Marionette TRACE conn5 -> [0,242,"getWindowHandle",null]
10:03:52 INFO - PROCESS | 5544 | 1477587832926 Marionette TRACE conn5 <- [1,242,null,{"value":"2147483652"}]
10:03:52 INFO - TEST-START | /XMLHttpRequest/interfaces.html
10:03:52 INFO - PROCESS | 5544 | 1477587832930 Marionette TRACE conn5 -> [0,243,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:53 INFO - PROCESS | 5544 | 1477587832999 Marionette TRACE conn5 <- [1,243,null,{"value":null}]
10:03:53 INFO - PROCESS | 5544 | 1477587833014 Marionette TRACE conn5 -> [0,244,"getWindowHandles",null]
10:03:53 INFO - PROCESS | 5544 | 1477587833017 Marionette TRACE conn5 <- [1,244,null,["2147483652"]]
10:03:53 INFO - PROCESS | 5544 | 1477587833020 Marionette TRACE conn5 -> [0,245,"switchToWindow",{"name":"2147483652"}]
10:03:53 INFO - PROCESS | 5544 | 1477587833023 Marionette TRACE conn5 <- [1,245,null,{}]
10:03:53 INFO - PROCESS | 5544 | 1477587833030 Marionette TRACE conn5 -> [0,246,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/interfaces.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/interfaces.html\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:53 INFO - PROCESS | 5544 | ++DOCSHELL 0AC99C00 == 22 [pid = 5820] [id = 50]
10:03:53 INFO - PROCESS | 5544 | ++DOMWINDOW == 68 (0AC9EC00) [pid = 5820] [serial = 150] [outer = 00000000]
10:03:53 INFO - PROCESS | 5544 | ++DOMWINDOW == 69 (0B8E0C00) [pid = 5820] [serial = 151] [outer = 0AC9EC00]
10:03:53 INFO - PROCESS | 5544 | ++DOMWINDOW == 70 (0CC06C00) [pid = 5820] [serial = 152] [outer = 0AC9EC00]
10:03:53 INFO - PROCESS | 5544 | --DOCSHELL 0DAD8C00 == 21 [pid = 5820] [id = 45]
10:03:53 INFO - PROCESS | 5544 | --DOCSHELL 0DAB6400 == 20 [pid = 5820] [id = 44]
10:03:53 INFO - PROCESS | 5544 | --DOCSHELL 0D91D400 == 19 [pid = 5820] [id = 43]
10:03:53 INFO - PROCESS | 5544 | --DOCSHELL 0D8AF800 == 18 [pid = 5820] [id = 42]
10:03:53 INFO - PROCESS | 5544 | --DOCSHELL 0D7B0000 == 17 [pid = 5820] [id = 41]
10:03:53 INFO - PROCESS | 5544 | --DOCSHELL 0D4E2400 == 16 [pid = 5820] [id = 40]
10:03:53 INFO - PROCESS | 5544 | --DOCSHELL 0C925C00 == 15 [pid = 5820] [id = 39]
10:03:53 INFO - PROCESS | 5544 | --DOCSHELL 0C921800 == 14 [pid = 5820] [id = 38]
10:03:53 INFO - PROCESS | 5544 | --DOCSHELL 0B9FD800 == 13 [pid = 5820] [id = 37]
10:03:53 INFO - PROCESS | 5544 | --DOCSHELL 0AC9CC00 == 12 [pid = 5820] [id = 36]
10:03:53 INFO - PROCESS | 5544 | --DOCSHELL 0AC95800 == 11 [pid = 5820] [id = 35]
10:03:53 INFO - PROCESS | 5544 | --DOCSHELL 0AC94800 == 10 [pid = 5820] [id = 34]
10:03:53 INFO - PROCESS | 5544 | --DOCSHELL 0B9EF000 == 9 [pid = 5820] [id = 33]
10:03:53 INFO - PROCESS | 5544 | --DOCSHELL 0C1AFC00 == 8 [pid = 5820] [id = 28]
10:03:53 INFO - PROCESS | 5544 | --DOCSHELL 0AC9A400 == 7 [pid = 5820] [id = 32]
10:03:53 INFO - PROCESS | 5544 | --DOCSHELL 0B9FA000 == 6 [pid = 5820] [id = 31]
10:03:53 INFO - PROCESS | 5544 | --DOMWINDOW == 69 (0CB16400) [pid = 5820] [serial = 86] [outer = 00000000] [url = about:blank]
10:03:53 INFO - PROCESS | 5544 | [Child 5820] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1447
10:03:53 INFO - PROCESS | 5544 | [Child 5820] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1447
10:03:53 INFO - PROCESS | 5544 | [Child 5820] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1447
10:03:54 INFO - PROCESS | 5544 | 1477587834168 Marionette TRACE conn5 <- [1,246,null,{"value":["/XMLHttpRequest/interfaces.html",0,null,null,[["XMLHttpRequestEventTarget interface: existence and properties of interface object",0,null,null],["XMLHttpRequestEventTarget interface object length",0,null,null],["XMLHttpRequestEventTarget interface object name",0,null,null],["XMLHttpRequestEventTarget interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequestEventTarget interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequestEventTarget interface: attribute onloadstart",0,null,null],["XMLHttpRequestEventTarget interface: attribute onprogress",0,null,null],["XMLHttpRequestEventTarget interface: attribute onabort",0,null,null],["XMLHttpRequestEventTarget interface: attribute onerror",0,null,null],["XMLHttpRequestEventTarget interface: attribute onload",0,null,null],["XMLHttpRequestEventTarget interface: attribute ontimeout",0,null,null],["XMLHttpRequestEventTarget interface: attribute onloadend",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface object",0,null,null],["XMLHttpRequestUpload interface object length",0,null,null],["XMLHttpRequestUpload interface object name",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequestUpload must be primary interface of (new XMLHttpRequest()).upload",0,null,null],["Stringification of (new XMLHttpRequest()).upload",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onloadstart\" with the proper type (0)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onprogress\" with the proper type (1)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onabort\" with the proper type (2)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onerror\" with the proper type (3)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onload\" with the proper type (4)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"ontimeout\" with the proper type (5)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onloadend\" with the proper type (6)",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"addEventListener\" with the proper type (0)",0,null,null],["EventTarget interface: calling addEventListener(DOMString,EventListener,boolean) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"removeEventListener\" with the proper type (1)",0,null,null],["EventTarget interface: calling removeEventListener(DOMString,EventListener,boolean) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"dispatchEvent\" with the proper type (2)",0,null,null],["EventTarget interface: calling dispatchEvent(Event) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: existence and properties of interface object",0,null,null],["XMLHttpRequest interface object length",0,null,null],["XMLHttpRequest interface object name",0,null,null],["XMLHttpRequest interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequest interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequest interface: attribute onreadystatechange",0,null,null],["XMLHttpRequest interface: constant UNSENT on interface object",0,null,null],["XMLHttpRequest interface: constant UNSENT on interface prototype object",0,null,null],["XMLHttpRequest interface: constant OPENED on interface object",0,null,null],["XMLHttpRequest interface: constant OPENED on interface prototype object",0,null,null],["XMLHttpRequest interface: constant HEADERS_RECEIVED on interface object",0,null,null],["XMLHttpRequest interface: constant HEADERS_RECEIVED on interface prototype object",0,null,null],["XMLHttpRequest interface: constant LOADING on interface object",0,null,null],["XMLHttpRequest interface: constant LOADING on interface prototype object",0,null,null],["XMLHttpRequest interface: constant DONE on interface object",0,null,null],["XMLHttpRequest interface: constant DONE on interface prototype object",0,null,null],["XMLHttpRequest interface: attribute readyState",0,null,null],["XMLHttpRequest interface: operation open(ByteString,USVString)",0,null,null],["XMLHttpRequest interface: operation open(ByteString,USVString,boolean,USVString,USVString)",0,null,null],["XMLHttpRequest interface: operation setRequestHeader(ByteString,ByteString)",0,null,null],["XMLHttpRequest interface: attribute timeout",0,null,null],["XMLHttpRequest interface: attribute withCredentials",0,null,null],["XMLHttpRequest interface: attribute upload",0,null,null],["XMLHttpRequest interface: operation send([object Object],[object Object])",0,null,null],["XMLHttpRequest interface: operation abort()",0,null,null],["XMLHttpRequest interface: attribute responseURL",0,null,null],["XMLHttpRequest interface: attribute status",0,null,null],["XMLHttpRequest interface: attribute statusText",0,null,null],["XMLHttpRequest interface: operation getResponseHeader(ByteString)",0,null,null],["XMLHttpRequest interface: operation getAllResponseHeaders()",0,null,null],["XMLHttpRequest interface: operation overrideMimeType(DOMString)",0,null,null],["XMLHttpRequest interface: attribute responseType",0,null,null],["XMLHttpRequest interface: attribute response",0,null,null],["XMLHttpRequest interface: attribute responseText",0,null,null],["XMLHttpRequest interface: attribute responseXML",0,null,null],["XMLHttpRequest must be primary interface of new XMLHttpRequest()",0,null,null],["Stringification of new XMLHttpRequest()",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"onreadystatechange\" with the proper type (0)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"UNSENT\" with the proper type (1)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"OPENED\" with the proper type (2)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"HEADERS_RECEIVED\" with the proper type (3)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"LOADING\" with the proper type (4)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"DONE\" with the proper type (5)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"readyState\" with the proper type (6)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"open\" with the proper type (7)",0,null,null],["XMLHttpRequest interface: calling open(ByteString,USVString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"open\" with the proper type (8)",0,null,null],["XMLHttpRequest interface: calling open(ByteString,USVString,boolean,USVString,USVString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"setRequestHeader\" with the proper type (9)",0,null,null],["XMLHttpRequest interface: calling setRequestHeader(ByteString,ByteString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"timeout\" with the proper type (10)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"withCredentials\" with the proper type (11)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"upload\" with the proper type (12)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"send\" with the proper type (13)",0,null,null],["XMLHttpRequest interface: calling send([object Object],[object Object]) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"abort\" with the proper type (14)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseURL\" with the proper type (15)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"status\" with the proper type (16)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"statusText\" with the proper type (17)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"getResponseHeader\" with the proper type (18)",0,null,null],["XMLHttpRequest interface: calling getResponseHeader(ByteString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"getAllResponseHeaders\" with the proper type (19)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"overrideMimeType\" with the proper type (20)",0,null,null],["XMLHttpRequest interface: calling overrideMimeType(DOMString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseType\" with the proper type (21)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"response\" with the proper type (22)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseText\" with the proper type (23)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseXML\" with the proper type (24)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onloadstart\" with the proper type (0)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onprogress\" with the proper type (1)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onabort\" with the proper type (2)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onerror\" with the proper type (3)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onload\" with the proper type (4)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"ontimeout\" with the proper type (5)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onloadend\" with the proper type (6)",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"addEventListener\" with the proper type (0)",0,null,null],["EventTarget interface: calling addEventListener(DOMString,EventListener,boolean) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"removeEventListener\" with the proper type (1)",0,null,null],["EventTarget interface: calling removeEventListener(DOMString,EventListener,boolean) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"dispatchEvent\" with the proper type (2)",0,null,null],["EventTarget interface: calling dispatchEvent(Event) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["FormData interface: existence and properties of interface object",0,null,null],["FormData interface object length",0,null,null],["FormData interface object name",0,null,null],["FormData interface: existence and properties of interface prototype object",0,null,null],["FormData interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["FormData interface: operation append(USVString,Blob,USVString)",0,null,null],["FormData interface: operation append(USVString,USVString)",0,null,null],["FormData interface: operation delete(USVString)",0,null,null],["FormData interface: operation get(USVString)",0,null,null],["FormData interface: operation getAll(USVString)",0,null,null],["FormData interface: operation has(USVString)",0,null,null],["FormData interface: operation set(USVString,Blob,USVString)",0,null,null],["FormData interface: operation set(USVString,USVString)",0,null,null],["FormData must be primary interface of new FormData()",0,null,null],["Stringification of new FormData()",0,null,null],["FormData interface: new FormData() must inherit property \"append\" with the proper type (0)",0,null,null],["FormData interface: calling append(USVString,Blob,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"append\" with the proper type (1)",0,null,null],["FormData interface: calling append(USVString,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"delete\" with the proper type (2)",0,null,null],["FormData interface: calling delete(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"get\" with the proper type (3)",0,null,null],["FormData interface: calling get(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"getAll\" with the proper type (4)",0,null,null],["FormData interface: calling getAll(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"has\" with the proper type (5)",0,null,null],["FormData interface: calling has(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"set\" with the proper type (6)",0,null,null],["FormData interface: calling set(USVString,Blob,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"set\" with the proper type (7)",0,null,null],["FormData interface: calling set(USVString,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData must be primary interface of new FormData(form)",0,null,null],["Stringification of new FormData(form)",0,null,null],["FormData interface: new FormData(form) must inherit property \"append\" with the proper type (0)",0,null,null],["FormData interface: calling append(USVString,Blob,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"append\" with the proper type (1)",0,null,null],["FormData interface: calling append(USVString,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"delete\" with the proper type (2)",0,null,null],["FormData interface: calling delete(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"get\" with the proper type (3)",0,null,null],["FormData interface: calling get(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"getAll\" with the proper type (4)",0,null,null],["FormData interface: calling getAll(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"has\" with the proper type (5)",0,null,null],["FormData interface: calling has(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"set\" with the proper type (6)",0,null,null],["FormData interface: calling set(USVString,Blob,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"set\" with the proper type (7)",0,null,null],["FormData interface: calling set(USVString,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["ProgressEvent interface: existence and properties of interface object",0,null,null],["ProgressEvent interface object length",0,null,null],["ProgressEvent interface object name",0,null,null],["ProgressEvent interface: existence and properties of interface prototype object",0,null,null],["ProgressEvent interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["ProgressEvent interface: attribute lengthComputable",0,null,null],["ProgressEvent interface: attribute loaded",0,null,null],["ProgressEvent interface: attribute total",0,null,null]]]}]
10:03:54 INFO - ..........................................................................................................................................................................
10:03:54 INFO - TEST-OK | /XMLHttpRequest/interfaces.html | took 1345ms
10:03:54 INFO - PROCESS | 5544 | 1477587834281 Marionette TRACE conn5 -> [0,247,"getWindowHandle",null]
10:03:54 INFO - PROCESS | 5544 | 1477587834285 Marionette TRACE conn5 <- [1,247,null,{"value":"2147483652"}]
10:03:54 INFO - TEST-START | /XMLHttpRequest/open-after-abort.htm
10:03:54 INFO - PROCESS | 5544 | 1477587834293 Marionette TRACE conn5 -> [0,248,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:54 INFO - PROCESS | 5544 | 1477587834391 Marionette TRACE conn5 <- [1,248,null,{"value":null}]
10:03:54 INFO - PROCESS | 5544 | 1477587834412 Marionette TRACE conn5 -> [0,249,"getWindowHandles",null]
10:03:54 INFO - PROCESS | 5544 | 1477587834416 Marionette TRACE conn5 <- [1,249,null,["2147483652"]]
10:03:54 INFO - PROCESS | 5544 | 1477587834421 Marionette TRACE conn5 -> [0,250,"switchToWindow",{"name":"2147483652"}]
10:03:54 INFO - PROCESS | 5544 | 1477587834432 Marionette TRACE conn5 <- [1,250,null,{}]
10:03:54 INFO - PROCESS | 5544 | 1477587834437 Marionette TRACE conn5 -> [0,251,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-after-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-after-abort.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:54 INFO - PROCESS | 5544 | ++DOCSHELL 0CF54400 == 7 [pid = 5820] [id = 51]
10:03:54 INFO - PROCESS | 5544 | ++DOMWINDOW == 70 (0CF59C00) [pid = 5820] [serial = 153] [outer = 00000000]
10:03:54 INFO - PROCESS | 5544 | ++DOMWINDOW == 71 (0D8B1000) [pid = 5820] [serial = 154] [outer = 0CF59C00]
10:03:54 INFO - PROCESS | 5544 | ++DOMWINDOW == 72 (0D920400) [pid = 5820] [serial = 155] [outer = 0CF59C00]
10:03:54 INFO - PROCESS | 5544 | 1477587834875 Marionette TRACE conn5 <- [1,251,null,{"value":["/XMLHttpRequest/open-after-abort.htm",0,null,null,[["XMLHttpRequest: open() after abort()",0,null,null]]]}]
10:03:54 INFO - .
10:03:54 INFO - TEST-OK | /XMLHttpRequest/open-after-abort.htm | took 630ms
10:03:54 INFO - PROCESS | 5544 | 1477587834925 Marionette TRACE conn5 -> [0,252,"getWindowHandle",null]
10:03:54 INFO - TEST-START | /XMLHttpRequest/open-after-setrequestheader.htm
10:03:54 INFO - PROCESS | 5544 | 1477587834929 Marionette TRACE conn5 <- [1,252,null,{"value":"2147483652"}]
10:03:54 INFO - PROCESS | 5544 | 1477587834934 Marionette TRACE conn5 -> [0,253,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:55 INFO - PROCESS | 5544 | 1477587835031 Marionette TRACE conn5 <- [1,253,null,{"value":null}]
10:03:55 INFO - PROCESS | 5544 | 1477587835051 Marionette TRACE conn5 -> [0,254,"getWindowHandles",null]
10:03:55 INFO - PROCESS | 5544 | 1477587835054 Marionette TRACE conn5 <- [1,254,null,["2147483652"]]
10:03:55 INFO - PROCESS | 5544 | 1477587835058 Marionette TRACE conn5 -> [0,255,"switchToWindow",{"name":"2147483652"}]
10:03:55 INFO - PROCESS | 5544 | 1477587835062 Marionette TRACE conn5 <- [1,255,null,{}]
10:03:55 INFO - PROCESS | 5544 | 1477587835065 Marionette TRACE conn5 -> [0,256,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-after-setrequestheader.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-after-setrequestheader.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:55 INFO - PROCESS | 5544 | ++DOCSHELL 0DABE800 == 8 [pid = 5820] [id = 52]
10:03:55 INFO - PROCESS | 5544 | ++DOMWINDOW == 73 (0DAC2400) [pid = 5820] [serial = 156] [outer = 00000000]
10:03:55 INFO - PROCESS | 5544 | ++DOMWINDOW == 74 (0DADA400) [pid = 5820] [serial = 157] [outer = 0DAC2400]
10:03:55 INFO - PROCESS | 5544 | ++DOMWINDOW == 75 (0DAE1000) [pid = 5820] [serial = 158] [outer = 0DAC2400]
10:03:55 INFO - PROCESS | 5544 | 1477587835426 Marionette TRACE conn5 <- [1,256,null,{"value":["/XMLHttpRequest/open-after-setrequestheader.htm",0,null,null,[["XMLHttpRequest: open() after setRequestHeader()",0,null,null]]]}]
10:03:55 INFO - .
10:03:55 INFO - TEST-OK | /XMLHttpRequest/open-after-setrequestheader.htm | took 530ms
10:03:55 INFO - PROCESS | 5544 | 1477587835471 Marionette TRACE conn5 -> [0,257,"getWindowHandle",null]
10:03:55 INFO - PROCESS | 5544 | 1477587835476 Marionette TRACE conn5 <- [1,257,null,{"value":"2147483652"}]
10:03:55 INFO - TEST-START | /XMLHttpRequest/open-during-abort.htm
10:03:55 INFO - PROCESS | 5544 | 1477587835490 Marionette TRACE conn5 -> [0,258,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:55 INFO - PROCESS | 5544 | 1477587835560 Marionette TRACE conn5 <- [1,258,null,{"value":null}]
10:03:55 INFO - PROCESS | 5544 | 1477587835576 Marionette TRACE conn5 -> [0,259,"getWindowHandles",null]
10:03:55 INFO - PROCESS | 5544 | 1477587835579 Marionette TRACE conn5 <- [1,259,null,["2147483652"]]
10:03:55 INFO - PROCESS | 5544 | 1477587835584 Marionette TRACE conn5 -> [0,260,"switchToWindow",{"name":"2147483652"}]
10:03:55 INFO - PROCESS | 5544 | 1477587835589 Marionette TRACE conn5 <- [1,260,null,{}]
10:03:55 INFO - PROCESS | 5544 | 1477587835593 Marionette TRACE conn5 -> [0,261,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-during-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-during-abort.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:55 INFO - PROCESS | 5544 | ++DOCSHELL 0DAD4C00 == 9 [pid = 5820] [id = 53]
10:03:55 INFO - PROCESS | 5544 | ++DOMWINDOW == 76 (0DADA800) [pid = 5820] [serial = 159] [outer = 00000000]
10:03:55 INFO - PROCESS | 5544 | ++DOMWINDOW == 77 (0DDCB400) [pid = 5820] [serial = 160] [outer = 0DADA800]
10:03:55 INFO - PROCESS | 5544 | ++DOMWINDOW == 78 (0DDCF000) [pid = 5820] [serial = 161] [outer = 0DADA800]
10:03:56 INFO - PROCESS | 5544 | 1477587836003 Marionette TRACE conn5 <- [1,261,null,{"value":["/XMLHttpRequest/open-during-abort.htm",0,null,null,[["XMLHttpRequest: open() during abort()",0,null,null]]]}]
10:03:56 INFO - .
10:03:56 INFO - TEST-OK | /XMLHttpRequest/open-during-abort.htm | took 570ms
10:03:56 INFO - PROCESS | 5544 | 1477587836055 Marionette TRACE conn5 -> [0,262,"getWindowHandle",null]
10:03:56 INFO - PROCESS | 5544 | 1477587836058 Marionette TRACE conn5 <- [1,262,null,{"value":"2147483652"}]
10:03:56 INFO - TEST-START | /XMLHttpRequest/open-method-bogus.htm
10:03:56 INFO - PROCESS | 5544 | 1477587836063 Marionette TRACE conn5 -> [0,263,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:56 INFO - PROCESS | 5544 | 1477587836141 Marionette TRACE conn5 <- [1,263,null,{"value":null}]
10:03:56 INFO - PROCESS | 5544 | 1477587836152 Marionette TRACE conn5 -> [0,264,"getWindowHandles",null]
10:03:56 INFO - PROCESS | 5544 | 1477587836154 Marionette TRACE conn5 <- [1,264,null,["2147483652"]]
10:03:56 INFO - PROCESS | 5544 | 1477587836160 Marionette TRACE conn5 -> [0,265,"switchToWindow",{"name":"2147483652"}]
10:03:56 INFO - PROCESS | 5544 | 1477587836164 Marionette TRACE conn5 <- [1,265,null,{}]
10:03:56 INFO - PROCESS | 5544 | 1477587836170 Marionette TRACE conn5 -> [0,266,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-bogus.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-bogus.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:56 INFO - PROCESS | 5544 | ++DOCSHELL 0DDD2000 == 10 [pid = 5820] [id = 54]
10:03:56 INFO - PROCESS | 5544 | ++DOMWINDOW == 79 (0DDD7400) [pid = 5820] [serial = 162] [outer = 00000000]
10:03:56 INFO - PROCESS | 5544 | ++DOMWINDOW == 80 (0E1AD800) [pid = 5820] [serial = 163] [outer = 0DDD7400]
10:03:56 INFO - PROCESS | 5544 | ++DOMWINDOW == 81 (0E1B2400) [pid = 5820] [serial = 164] [outer = 0DDD7400]
10:03:56 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:56 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:56 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:56 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:56 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:56 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:56 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:56 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:56 INFO - PROCESS | 5544 | 1477587836603 Marionette TRACE conn5 <- [1,266,null,{"value":["/XMLHttpRequest/open-method-bogus.htm",0,null,null,[["XMLHttpRequest: open() - bogus methods ()",0,null,null],["XMLHttpRequest: open() - bogus methods (>)",0,null,null],["XMLHttpRequest: open() - bogus methods ( GET)",0,null,null],["XMLHttpRequest: open() - bogus methods (G T)",0,null,null],["XMLHttpRequest: open() - bogus methods (@GET)",0,null,null],["XMLHttpRequest: open() - bogus methods (G:ET)",0,null,null],["XMLHttpRequest: open() - bogus methods (GET?)",0,null,null],["XMLHttpRequest: open() - bogus methods (GET\n)",0,null,null]]]}]
10:03:56 INFO - ........
10:03:56 INFO - TEST-OK | /XMLHttpRequest/open-method-bogus.htm | took 570ms
10:03:56 INFO - PROCESS | 5544 | 1477587836636 Marionette TRACE conn5 -> [0,267,"getWindowHandle",null]
10:03:56 INFO - PROCESS | 5544 | 1477587836638 Marionette TRACE conn5 <- [1,267,null,{"value":"2147483652"}]
10:03:56 INFO - TEST-START | /XMLHttpRequest/open-method-case-insensitive.htm
10:03:56 INFO - PROCESS | 5544 | 1477587836642 Marionette TRACE conn5 -> [0,268,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:56 INFO - PROCESS | 5544 | 1477587836710 Marionette TRACE conn5 <- [1,268,null,{"value":null}]
10:03:56 INFO - PROCESS | 5544 | 1477587836726 Marionette TRACE conn5 -> [0,269,"getWindowHandles",null]
10:03:56 INFO - PROCESS | 5544 | 1477587836728 Marionette TRACE conn5 <- [1,269,null,["2147483652"]]
10:03:56 INFO - PROCESS | 5544 | 1477587836733 Marionette TRACE conn5 -> [0,270,"switchToWindow",{"name":"2147483652"}]
10:03:56 INFO - PROCESS | 5544 | 1477587836737 Marionette TRACE conn5 <- [1,270,null,{}]
10:03:56 INFO - PROCESS | 5544 | 1477587836740 Marionette TRACE conn5 -> [0,271,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-case-insensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-case-insensitive.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:56 INFO - PROCESS | 5544 | ++DOCSHELL 0E1AA000 == 11 [pid = 5820] [id = 55]
10:03:56 INFO - PROCESS | 5544 | ++DOMWINDOW == 82 (0E1ADC00) [pid = 5820] [serial = 165] [outer = 00000000]
10:03:56 INFO - PROCESS | 5544 | ++DOMWINDOW == 83 (0E866C00) [pid = 5820] [serial = 166] [outer = 0E1ADC00]
10:03:56 INFO - PROCESS | 5544 | ++DOMWINDOW == 84 (0E869400) [pid = 5820] [serial = 167] [outer = 0E1ADC00]
10:03:57 INFO - PROCESS | 5544 | 1477587837169 Marionette TRACE conn5 <- [1,271,null,{"value":["/XMLHttpRequest/open-method-case-insensitive.htm",0,null,null,[["XMLHttpRequest: open() - case-insensitive methods test (DELETE)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (GET)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (HEAD)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (OPTIONS)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (POST)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (PUT)",0,null,null]]]}]
10:03:57 INFO - ......
10:03:57 INFO - TEST-OK | /XMLHttpRequest/open-method-case-insensitive.htm | took 570ms
10:03:57 INFO - PROCESS | 5544 | 1477587837215 Marionette TRACE conn5 -> [0,272,"getWindowHandle",null]
10:03:57 INFO - PROCESS | 5544 | 1477587837217 Marionette TRACE conn5 <- [1,272,null,{"value":"2147483652"}]
10:03:57 INFO - TEST-START | /XMLHttpRequest/open-method-case-sensitive.htm
10:03:57 INFO - PROCESS | 5544 | 1477587837222 Marionette TRACE conn5 -> [0,273,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:57 INFO - PROCESS | 5544 | 1477587837307 Marionette TRACE conn5 <- [1,273,null,{"value":null}]
10:03:57 INFO - PROCESS | 5544 | 1477587837320 Marionette TRACE conn5 -> [0,274,"getWindowHandles",null]
10:03:57 INFO - PROCESS | 5544 | 1477587837324 Marionette TRACE conn5 <- [1,274,null,["2147483652"]]
10:03:57 INFO - PROCESS | 5544 | 1477587837329 Marionette TRACE conn5 -> [0,275,"switchToWindow",{"name":"2147483652"}]
10:03:57 INFO - PROCESS | 5544 | 1477587837333 Marionette TRACE conn5 <- [1,275,null,{}]
10:03:57 INFO - PROCESS | 5544 | 1477587837337 Marionette TRACE conn5 -> [0,276,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-case-sensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-case-sensitive.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:57 INFO - PROCESS | 5544 | ++DOCSHELL 0E0D0400 == 12 [pid = 5820] [id = 56]
10:03:57 INFO - PROCESS | 5544 | ++DOMWINDOW == 85 (0E0D0800) [pid = 5820] [serial = 168] [outer = 00000000]
10:03:57 INFO - PROCESS | 5544 | ++DOMWINDOW == 86 (0E0D4400) [pid = 5820] [serial = 169] [outer = 0E0D0800]
10:03:57 INFO - PROCESS | 5544 | ++DOMWINDOW == 87 (0E0D6400) [pid = 5820] [serial = 170] [outer = 0E0D0800]
10:03:58 INFO - PROCESS | 5544 | --DOMWINDOW == 86 (0C927000) [pid = 5820] [serial = 117] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata.htm]
10:03:58 INFO - PROCESS | 5544 | --DOMWINDOW == 85 (0BFE3000) [pid = 5820] [serial = 111] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-has.htm]
10:03:58 INFO - PROCESS | 5544 | --DOMWINDOW == 84 (0AC98000) [pid = 5820] [serial = 105] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-foreach.html]
10:03:58 INFO - PROCESS | 5544 | --DOMWINDOW == 83 (0C923800) [pid = 5820] [serial = 114] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-set.htm]
10:03:58 INFO - PROCESS | 5544 | --DOMWINDOW == 82 (0AC9DC00) [pid = 5820] [serial = 108] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-get.htm]
10:03:58 INFO - PROCESS | 5544 | --DOMWINDOW == 81 (0AC9D400) [pid = 5820] [serial = 87] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-timeout-order.htm]
10:03:58 INFO - PROCESS | 5544 | --DOMWINDOW == 80 (0AE9D000) [pid = 5820] [serial = 90] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-timeout.htm]
10:03:58 INFO - PROCESS | 5544 | 1477587838487 Marionette TRACE conn5 <- [1,276,null,{"value":["/XMLHttpRequest/open-method-case-sensitive.htm",0,null,null,[["XMLHttpRequest: open() - case-sensitive methods test (XUNICORN)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (xUNIcorn)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (chiCKEN)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (PATCH)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (patCH)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (copy)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (COpy)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (inDEX)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (movE)",0,null,null]]]}]
10:03:58 INFO - .........
10:03:58 INFO - TEST-OK | /XMLHttpRequest/open-method-case-sensitive.htm | took 1323ms
10:03:58 INFO - PROCESS | 5544 | 1477587838549 Marionette TRACE conn5 -> [0,277,"getWindowHandle",null]
10:03:58 INFO - PROCESS | 5544 | 1477587838551 Marionette TRACE conn5 <- [1,277,null,{"value":"2147483652"}]
10:03:58 INFO - TEST-START | /XMLHttpRequest/open-method-insecure.htm
10:03:58 INFO - PROCESS | 5544 | 1477587838556 Marionette TRACE conn5 -> [0,278,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:58 INFO - PROCESS | 5544 | 1477587838625 Marionette TRACE conn5 <- [1,278,null,{"value":null}]
10:03:58 INFO - PROCESS | 5544 | 1477587838639 Marionette TRACE conn5 -> [0,279,"getWindowHandles",null]
10:03:58 INFO - PROCESS | 5544 | 1477587838641 Marionette TRACE conn5 <- [1,279,null,["2147483652"]]
10:03:58 INFO - PROCESS | 5544 | 1477587838646 Marionette TRACE conn5 -> [0,280,"switchToWindow",{"name":"2147483652"}]
10:03:58 INFO - PROCESS | 5544 | 1477587838649 Marionette TRACE conn5 <- [1,280,null,{}]
10:03:58 INFO - PROCESS | 5544 | 1477587838653 Marionette TRACE conn5 -> [0,281,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-insecure.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-insecure.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:58 INFO - PROCESS | 5544 | ++DOCSHELL 0C1B6400 == 13 [pid = 5820] [id = 57]
10:03:58 INFO - PROCESS | 5544 | ++DOMWINDOW == 81 (0C923800) [pid = 5820] [serial = 171] [outer = 00000000]
10:03:58 INFO - PROCESS | 5544 | ++DOMWINDOW == 82 (0DDCEC00) [pid = 5820] [serial = 172] [outer = 0C923800]
10:03:58 INFO - PROCESS | 5544 | ++DOMWINDOW == 83 (0E0D5C00) [pid = 5820] [serial = 173] [outer = 0C923800]
10:03:58 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:58 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:58 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:58 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:58 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:58 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:58 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:58 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:58 INFO - PROCESS | 5544 | [Child 5820] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
10:03:59 INFO - PROCESS | 5544 | 1477587839014 Marionette TRACE conn5 <- [1,281,null,{"value":["/XMLHttpRequest/open-method-insecure.htm",0,null,null,[["XMLHttpRequest: open() - \"insecure\" methods (track)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (TRACK)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (trAck)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (TRACE)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (trace)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (traCE)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (connect)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (CONNECT)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (connECT)",0,null,null]]]}]
10:03:59 INFO - .........
10:03:59 INFO - TEST-OK | /XMLHttpRequest/open-method-insecure.htm | took 530ms
10:03:59 INFO - PROCESS | 5544 | 1477587839089 Marionette TRACE conn5 -> [0,282,"getWindowHandle",null]
10:03:59 INFO - TEST-START | /XMLHttpRequest/open-method-responsetype-set-sync.htm
10:03:59 INFO - PROCESS | 5544 | 1477587839092 Marionette TRACE conn5 <- [1,282,null,{"value":"2147483652"}]
10:03:59 INFO - PROCESS | 5544 | 1477587839096 Marionette TRACE conn5 -> [0,283,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:59 INFO - PROCESS | 5544 | 1477587839165 Marionette TRACE conn5 <- [1,283,null,{"value":null}]
10:03:59 INFO - PROCESS | 5544 | 1477587839173 Marionette TRACE conn5 -> [0,284,"getWindowHandles",null]
10:03:59 INFO - PROCESS | 5544 | 1477587839176 Marionette TRACE conn5 <- [1,284,null,["2147483652"]]
10:03:59 INFO - PROCESS | 5544 | 1477587839180 Marionette TRACE conn5 -> [0,285,"switchToWindow",{"name":"2147483652"}]
10:03:59 INFO - PROCESS | 5544 | 1477587839184 Marionette TRACE conn5 <- [1,285,null,{}]
10:03:59 INFO - PROCESS | 5544 | 1477587839187 Marionette TRACE conn5 -> [0,286,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-responsetype-set-sync.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-responsetype-set-sync.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:59 INFO - PROCESS | 5544 | ++DOCSHELL 0CB0E800 == 14 [pid = 5820] [id = 58]
10:03:59 INFO - PROCESS | 5544 | ++DOMWINDOW == 84 (0D40F800) [pid = 5820] [serial = 174] [outer = 00000000]
10:03:59 INFO - PROCESS | 5544 | ++DOMWINDOW == 85 (0E86A000) [pid = 5820] [serial = 175] [outer = 0D40F800]
10:03:59 INFO - PROCESS | 5544 | ++DOMWINDOW == 86 (0E6A4000) [pid = 5820] [serial = 176] [outer = 0D40F800]
10:03:59 INFO - PROCESS | 5544 | 1477587839538 Marionette TRACE conn5 <- [1,286,null,{"value":["/XMLHttpRequest/open-method-responsetype-set-sync.htm",0,null,null,[["XMLHttpRequest: open() sync request not allowed if responseType is set (arraybuffer)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (blob)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (json)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (text)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (document)",0,null,null]]]}]
10:03:59 INFO - .....
10:03:59 INFO - TEST-OK | /XMLHttpRequest/open-method-responsetype-set-sync.htm | took 470ms
10:03:59 INFO - TEST-START | /XMLHttpRequest/open-open-send.htm
10:03:59 INFO - PROCESS | 5544 | 1477587839569 Marionette TRACE conn5 -> [0,287,"getWindowHandle",null]
10:03:59 INFO - PROCESS | 5544 | 1477587839571 Marionette TRACE conn5 <- [1,287,null,{"value":"2147483652"}]
10:03:59 INFO - PROCESS | 5544 | 1477587839576 Marionette TRACE conn5 -> [0,288,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:03:59 INFO - PROCESS | 5544 | 1477587839648 Marionette TRACE conn5 <- [1,288,null,{"value":null}]
10:03:59 INFO - PROCESS | 5544 | 1477587839656 Marionette TRACE conn5 -> [0,289,"getWindowHandles",null]
10:03:59 INFO - PROCESS | 5544 | 1477587839658 Marionette TRACE conn5 <- [1,289,null,["2147483652"]]
10:03:59 INFO - PROCESS | 5544 | 1477587839661 Marionette TRACE conn5 -> [0,290,"switchToWindow",{"name":"2147483652"}]
10:03:59 INFO - PROCESS | 5544 | 1477587839665 Marionette TRACE conn5 <- [1,290,null,{}]
10:03:59 INFO - PROCESS | 5544 | 1477587839670 Marionette TRACE conn5 -> [0,291,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-open-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-open-send.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:03:59 INFO - PROCESS | 5544 | ++DOCSHELL 0E6AB000 == 15 [pid = 5820] [id = 59]
10:03:59 INFO - PROCESS | 5544 | ++DOMWINDOW == 87 (0E6AD400) [pid = 5820] [serial = 177] [outer = 00000000]
10:03:59 INFO - PROCESS | 5544 | ++DOMWINDOW == 88 (0E864400) [pid = 5820] [serial = 178] [outer = 0E6AD400]
10:03:59 INFO - PROCESS | 5544 | ++DOMWINDOW == 89 (0E724400) [pid = 5820] [serial = 179] [outer = 0E6AD400]
10:04:00 INFO - PROCESS | 5544 | 1477587840058 Marionette TRACE conn5 <- [1,291,null,{"value":["/XMLHttpRequest/open-open-send.htm",0,null,null,[["XMLHttpRequest: open() - open() - send()",0,null,null]]]}]
10:04:00 INFO - .
10:04:00 INFO - TEST-OK | /XMLHttpRequest/open-open-send.htm | took 530ms
10:04:00 INFO - PROCESS | 5544 | 1477587840109 Marionette TRACE conn5 -> [0,292,"getWindowHandle",null]
10:04:00 INFO - TEST-START | /XMLHttpRequest/open-open-sync-send.htm
10:04:00 INFO - PROCESS | 5544 | 1477587840112 Marionette TRACE conn5 <- [1,292,null,{"value":"2147483652"}]
10:04:00 INFO - PROCESS | 5544 | 1477587840116 Marionette TRACE conn5 -> [0,293,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:04:00 INFO - PROCESS | 5544 | 1477587840186 Marionette TRACE conn5 <- [1,293,null,{"value":null}]
10:04:00 INFO - PROCESS | 5544 | 1477587840194 Marionette TRACE conn5 -> [0,294,"getWindowHandles",null]
10:04:00 INFO - PROCESS | 5544 | 1477587840196 Marionette TRACE conn5 <- [1,294,null,["2147483652"]]
10:04:00 INFO - PROCESS | 5544 | 1477587840201 Marionette TRACE conn5 -> [0,295,"switchToWindow",{"name":"2147483652"}]
10:04:00 INFO - PROCESS | 5544 | 1477587840205 Marionette TRACE conn5 <- [1,295,null,{}]
10:04:00 INFO - PROCESS | 5544 | 1477587840209 Marionette TRACE conn5 -> [0,296,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-open-sync-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-open-sync-send.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:04:00 INFO - PROCESS | 5544 | ++DOCSHELL 0AC9C400 == 16 [pid = 5820] [id = 60]
10:04:00 INFO - PROCESS | 5544 | ++DOMWINDOW == 90 (0AC9C800) [pid = 5820] [serial = 180] [outer = 00000000]
10:04:00 INFO - PROCESS | 5544 | ++DOMWINDOW == 91 (0B87E000) [pid = 5820] [serial = 181] [outer = 0AC9C800]
10:04:00 INFO - PROCESS | 5544 | ++DOMWINDOW == 92 (0B9F9400) [pid = 5820] [serial = 182] [outer = 0AC9C800]
10:04:00 INFO - PROCESS | 5544 | 1477587840814 Marionette TRACE conn5 <- [1,296,null,{"value":["/XMLHttpRequest/open-open-sync-send.htm",0,null,null,[["XMLHttpRequest: open() - open() (sync) - send()",0,null,null]]]}]
10:04:00 INFO - .
10:04:00 INFO - TEST-OK | /XMLHttpRequest/open-open-sync-send.htm | took 730ms
10:04:00 INFO - PROCESS | 5544 | 1477587840850 Marionette TRACE conn5 -> [0,297,"getWindowHandle",null]
10:04:00 INFO - PROCESS | 5544 | 1477587840854 Marionette TRACE conn5 <- [1,297,null,{"value":"2147483652"}]
10:04:00 INFO - TEST-START | /XMLHttpRequest/open-referer.htm
10:04:00 INFO - PROCESS | 5544 | 1477587840863 Marionette TRACE conn5 -> [0,298,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:04:00 INFO - PROCESS | 5544 | 1477587840980 Marionette TRACE conn5 <- [1,298,null,{"value":null}]
10:04:01 INFO - PROCESS | 5544 | 1477587841011 Marionette TRACE conn5 -> [0,299,"getWindowHandles",null]
10:04:01 INFO - PROCESS | 5544 | 1477587841015 Marionette TRACE conn5 <- [1,299,null,["2147483652"]]
10:04:01 INFO - PROCESS | 5544 | 1477587841022 Marionette TRACE conn5 -> [0,300,"switchToWindow",{"name":"2147483652"}]
10:04:01 INFO - PROCESS | 5544 | 1477587841028 Marionette TRACE conn5 <- [1,300,null,{}]
10:04:01 INFO - PROCESS | 5544 | 1477587841034 Marionette TRACE conn5 -> [0,301,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-referer.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-referer.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:04:01 INFO - PROCESS | 5544 | ++DOCSHELL 0BFEF400 == 17 [pid = 5820] [id = 61]
10:04:01 INFO - PROCESS | 5544 | ++DOMWINDOW == 93 (0BFF0800) [pid = 5820] [serial = 183] [outer = 00000000]
10:04:01 INFO - PROCESS | 5544 | ++DOMWINDOW == 94 (0CF5A000) [pid = 5820] [serial = 184] [outer = 0BFF0800]
10:04:01 INFO - PROCESS | 5544 | ++DOMWINDOW == 95 (0D4E1800) [pid = 5820] [serial = 185] [outer = 0BFF0800]
10:04:01 INFO - PROCESS | 5544 | 1477587841621 Marionette TRACE conn5 <- [1,301,null,{"value":["/XMLHttpRequest/open-referer.htm",0,null,null,[["XMLHttpRequest: open() - value of Referer header",0,null,null]]]}]
10:04:01 INFO - .
10:04:01 INFO - TEST-OK | /XMLHttpRequest/open-referer.htm | took 810ms
10:04:01 INFO - PROCESS | 5544 | 1477587841675 Marionette TRACE conn5 -> [0,302,"getWindowHandle",null]
10:04:01 INFO - PROCESS | 5544 | 1477587841680 Marionette TRACE conn5 <- [1,302,null,{"value":"2147483652"}]
10:04:01 INFO - TEST-START | /XMLHttpRequest/open-send-open.htm
10:04:01 INFO - PROCESS | 5544 | 1477587841686 Marionette TRACE conn5 -> [0,303,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:04:01 INFO - PROCESS | 5544 | 1477587841811 Marionette TRACE conn5 <- [1,303,null,{"value":null}]
10:04:01 INFO - PROCESS | 5544 | 1477587841830 Marionette TRACE conn5 -> [0,304,"getWindowHandles",null]
10:04:01 INFO - PROCESS | 5544 | 1477587841835 Marionette TRACE conn5 <- [1,304,null,["2147483652"]]
10:04:01 INFO - PROCESS | 5544 | 1477587841841 Marionette TRACE conn5 -> [0,305,"switchToWindow",{"name":"2147483652"}]
10:04:01 INFO - PROCESS | 5544 | 1477587841846 Marionette TRACE conn5 <- [1,305,null,{}]
10:04:01 INFO - PROCESS | 5544 | 1477587841850 Marionette TRACE conn5 -> [0,306,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-send-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-send-open.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:04:01 INFO - PROCESS | 5544 | ++DOCSHELL 0D8B5000 == 18 [pid = 5820] [id = 62]
10:04:01 INFO - PROCESS | 5544 | ++DOMWINDOW == 96 (0D91C000) [pid = 5820] [serial = 186] [outer = 00000000]
10:04:01 INFO - PROCESS | 5544 | ++DOMWINDOW == 97 (0DAC2000) [pid = 5820] [serial = 187] [outer = 0D91C000]
10:04:02 INFO - PROCESS | 5544 | ++DOMWINDOW == 98 (0DB48000) [pid = 5820] [serial = 188] [outer = 0D91C000]
10:04:02 INFO - PROCESS | 5544 | 1477587842328 Marionette TRACE conn5 <- [1,306,null,{"value":["/XMLHttpRequest/open-send-open.htm",0,null,null,[["XMLHttpRequest: open() - send() - open()",0,null,null]]]}]
10:04:02 INFO - .
10:04:02 INFO - TEST-OK | /XMLHttpRequest/open-send-open.htm | took 670ms
10:04:02 INFO - TEST-START | /XMLHttpRequest/open-sync-open-send.htm
10:04:02 INFO - PROCESS | 5544 | 1477587842359 Marionette TRACE conn5 -> [0,307,"getWindowHandle",null]
10:04:02 INFO - PROCESS | 5544 | 1477587842363 Marionette TRACE conn5 <- [1,307,null,{"value":"2147483652"}]
10:04:02 INFO - PROCESS | 5544 | 1477587842368 Marionette TRACE conn5 -> [0,308,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:04:02 INFO - PROCESS | 5544 | 1477587842453 Marionette TRACE conn5 <- [1,308,null,{"value":null}]
10:04:02 INFO - PROCESS | 5544 | 1477587842467 Marionette TRACE conn5 -> [0,309,"getWindowHandles",null]
10:04:02 INFO - PROCESS | 5544 | 1477587842470 Marionette TRACE conn5 <- [1,309,null,["2147483652"]]
10:04:02 INFO - PROCESS | 5544 | 1477587842474 Marionette TRACE conn5 -> [0,310,"switchToWindow",{"name":"2147483652"}]
10:04:02 INFO - PROCESS | 5544 | 1477587842478 Marionette TRACE conn5 <- [1,310,null,{}]
10:04:02 INFO - PROCESS | 5544 | 1477587842482 Marionette TRACE conn5 -> [0,311,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-sync-open-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-sync-open-send.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:04:02 INFO - PROCESS | 5544 | ++DOCSHELL 0AC94800 == 19 [pid = 5820] [id = 63]
10:04:02 INFO - PROCESS | 5544 | ++DOMWINDOW == 99 (0AC99800) [pid = 5820] [serial = 189] [outer = 00000000]
10:04:02 INFO - PROCESS | 5544 | ++DOMWINDOW == 100 (0B8DD000) [pid = 5820] [serial = 190] [outer = 0AC99800]
10:04:02 INFO - PROCESS | 5544 | ++DOMWINDOW == 101 (0B9F4000) [pid = 5820] [serial = 191] [outer = 0AC99800]
10:04:03 INFO - PROCESS | 5544 | 1477587843014 Marionette TRACE conn5 <- [1,311,null,{"value":["/XMLHttpRequest/open-sync-open-send.htm",0,null,null,[["XMLHttpRequest: open() (sync) - send() - open()",0,null,null]]]}]
10:04:03 INFO - .
10:04:03 INFO - TEST-OK | /XMLHttpRequest/open-sync-open-send.htm | took 670ms
10:04:03 INFO - PROCESS | 5544 | 1477587843045 Marionette TRACE conn5 -> [0,312,"getWindowHandle",null]
10:04:03 INFO - PROCESS | 5544 | 1477587843051 Marionette TRACE conn5 <- [1,312,null,{"value":"2147483652"}]
10:04:03 INFO - PROCESS | 5544 | 1477587843055 Marionette TRACE conn5 -> [0,313,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:04:03 INFO - TEST-START | /XMLHttpRequest/open-url-about-blank-window.htm
10:04:03 INFO - PROCESS | 5544 | 1477587843132 Marionette TRACE conn5 <- [1,313,null,{"value":null}]
10:04:03 INFO - PROCESS | 5544 | 1477587843149 Marionette TRACE conn5 -> [0,314,"getWindowHandles",null]
10:04:03 INFO - PROCESS | 5544 | 1477587843152 Marionette TRACE conn5 <- [1,314,null,["2147483652"]]
10:04:03 INFO - PROCESS | 5544 | 1477587843155 Marionette TRACE conn5 -> [0,315,"switchToWindow",{"name":"2147483652"}]
10:04:03 INFO - PROCESS | 5544 | 1477587843160 Marionette TRACE conn5 <- [1,315,null,{}]
10:04:03 INFO - PROCESS | 5544 | 1477587843166 Marionette TRACE conn5 -> [0,316,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-about-blank-window.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-about-blank-window.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:04:03 INFO - PROCESS | 5544 | ++DOCSHELL 0B871400 == 20 [pid = 5820] [id = 64]
10:04:03 INFO - PROCESS | 5544 | ++DOMWINDOW == 102 (0B878C00) [pid = 5820] [serial = 192] [outer = 00000000]
10:04:03 INFO - PROCESS | 5544 | ++DOMWINDOW == 103 (0BFE7000) [pid = 5820] [serial = 193] [outer = 0B878C00]
10:04:03 INFO - PROCESS | 5544 | ++DOMWINDOW == 104 (0C1B9000) [pid = 5820] [serial = 194] [outer = 0B878C00]
10:04:03 INFO - PROCESS | 5544 | ++DOCSHELL 0CC12C00 == 21 [pid = 5820] [id = 65]
10:04:03 INFO - PROCESS | 5544 | ++DOMWINDOW == 105 (0CCDFC00) [pid = 5820] [serial = 195] [outer = 00000000]
10:04:03 INFO - PROCESS | 5544 | ++DOMWINDOW == 106 (0B8D7C00) [pid = 5820] [serial = 196] [outer = 0CCDFC00]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 0CB0E800 == 20 [pid = 5820] [id = 58]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 0E0D0400 == 19 [pid = 5820] [id = 56]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 0C1B6400 == 18 [pid = 5820] [id = 57]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 0DDD2000 == 17 [pid = 5820] [id = 54]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 0E1AA000 == 16 [pid = 5820] [id = 55]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 0DABE800 == 15 [pid = 5820] [id = 52]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 0DAD4C00 == 14 [pid = 5820] [id = 53]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 0AC99C00 == 13 [pid = 5820] [id = 50]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 0CF54400 == 12 [pid = 5820] [id = 51]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 0ACA2800 == 11 [pid = 5820] [id = 47]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 0B8DE400 == 10 [pid = 5820] [id = 48]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 087A0C00 == 9 [pid = 5820] [id = 49]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 0DAE0400 == 8 [pid = 5820] [id = 46]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 0E6AB000 == 7 [pid = 5820] [id = 59]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 0AC9C400 == 6 [pid = 5820] [id = 60]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 0BFEF400 == 5 [pid = 5820] [id = 61]
10:04:04 INFO - PROCESS | 5544 | --DOCSHELL 0D8B5000 == 4 [pid = 5820] [id = 62]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 105 (0D4E7800) [pid = 5820] [serial = 119] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 104 (0D4E2C00) [pid = 5820] [serial = 118] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 103 (0B8D9C00) [pid = 5820] [serial = 107] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 102 (0B874000) [pid = 5820] [serial = 106] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 101 (0B87F000) [pid = 5820] [serial = 110] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 100 (0B879400) [pid = 5820] [serial = 109] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 99 (0C1B6000) [pid = 5820] [serial = 113] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 98 (0C1AF400) [pid = 5820] [serial = 112] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 97 (0CF58C00) [pid = 5820] [serial = 116] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 96 (0CCE2400) [pid = 5820] [serial = 115] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 95 (0AEA0C00) [pid = 5820] [serial = 103] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 94 (0B8D7800) [pid = 5820] [serial = 97] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 93 (0CB0EC00) [pid = 5820] [serial = 100] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 92 (0AE9F800) [pid = 5820] [serial = 89] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 91 (0BFEA800) [pid = 5820] [serial = 94] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 90 (0AE98400) [pid = 5820] [serial = 88] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 89 (0B8DF400) [pid = 5820] [serial = 92] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | --DOMWINDOW == 88 (0B8D8800) [pid = 5820] [serial = 91] [outer = 00000000] [url = about:blank]
10:04:04 INFO - PROCESS | 5544 | 1477587844087 Marionette TRACE conn5 <- [1,316,null,{"value":["/XMLHttpRequest/open-url-about-blank-window.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs (about:blank iframe)",0,null,null]]]}]
10:04:04 INFO - .
10:04:04 INFO - TEST-OK | /XMLHttpRequest/open-url-about-blank-window.htm | took 1068ms
10:04:04 INFO - PROCESS | 5544 | 1477587844128 Marionette TRACE conn5 -> [0,317,"getWindowHandle",null]
10:04:04 INFO - PROCESS | 5544 | 1477587844131 Marionette TRACE conn5 <- [1,317,null,{"value":"2147483652"}]
10:04:04 INFO - TEST-START | /XMLHttpRequest/open-url-base-inserted-after-open.htm
10:04:04 INFO - PROCESS | 5544 | 1477587844135 Marionette TRACE conn5 -> [0,318,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:04:04 INFO - PROCESS | 5544 | 1477587844219 Marionette TRACE conn5 <- [1,318,null,{"value":null}]
10:04:04 INFO - PROCESS | 5544 | 1477587844239 Marionette TRACE conn5 -> [0,319,"getWindowHandles",null]
10:04:04 INFO - PROCESS | 5544 | 1477587844241 Marionette TRACE conn5 <- [1,319,null,["2147483652"]]
10:04:04 INFO - PROCESS | 5544 | 1477587844244 Marionette TRACE conn5 -> [0,320,"switchToWindow",{"name":"2147483652"}]
10:04:04 INFO - PROCESS | 5544 | 1477587844248 Marionette TRACE conn5 <- [1,320,null,{}]
10:04:04 INFO - PROCESS | 5544 | 1477587844252 Marionette TRACE conn5 -> [0,321,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base-inserted-after-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base-inserted-after-open.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:04:04 INFO - PROCESS | 5544 | ++DOCSHELL 08FDE800 == 5 [pid = 5820] [id = 66]
10:04:04 INFO - PROCESS | 5544 | ++DOMWINDOW == 89 (0A998C00) [pid = 5820] [serial = 197] [outer = 00000000]
10:04:04 INFO - PROCESS | 5544 | ++DOMWINDOW == 90 (0AC96400) [pid = 5820] [serial = 198] [outer = 0A998C00]
10:04:04 INFO - PROCESS | 5544 | ++DOMWINDOW == 91 (0AC9F400) [pid = 5820] [serial = 199] [outer = 0A998C00]
10:04:04 INFO - PROCESS | 5544 | 1477587844625 Marionette TRACE conn5 <- [1,321,null,{"value":["/XMLHttpRequest/open-url-base-inserted-after-open.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - insert after open()",0,null,null]]]}]
10:04:04 INFO - .
10:04:04 INFO - TEST-OK | /XMLHttpRequest/open-url-base-inserted-after-open.htm | took 530ms
10:04:04 INFO - PROCESS | 5544 | 1477587844668 Marionette TRACE conn5 -> [0,322,"getWindowHandle",null]
10:04:04 INFO - PROCESS | 5544 | 1477587844671 Marionette TRACE conn5 <- [1,322,null,{"value":"2147483652"}]
10:04:04 INFO - TEST-START | /XMLHttpRequest/open-url-base-inserted.htm
10:04:04 INFO - PROCESS | 5544 | 1477587844675 Marionette TRACE conn5 -> [0,323,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:04:04 INFO - PROCESS | 5544 | 1477587844757 Marionette TRACE conn5 <- [1,323,null,{"value":null}]
10:04:04 INFO - PROCESS | 5544 | 1477587844772 Marionette TRACE conn5 -> [0,324,"getWindowHandles",null]
10:04:04 INFO - PROCESS | 5544 | 1477587844775 Marionette TRACE conn5 <- [1,324,null,["2147483652"]]
10:04:04 INFO - PROCESS | 5544 | 1477587844778 Marionette TRACE conn5 -> [0,325,"switchToWindow",{"name":"2147483652"}]
10:04:04 INFO - PROCESS | 5544 | 1477587844781 Marionette TRACE conn5 <- [1,325,null,{}]
10:04:04 INFO - PROCESS | 5544 | 1477587844785 Marionette TRACE conn5 -> [0,326,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base-inserted.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base-inserted.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:04:04 INFO - PROCESS | 5544 | ++DOCSHELL 0ACA1800 == 6 [pid = 5820] [id = 67]
10:04:04 INFO - PROCESS | 5544 | ++DOMWINDOW == 92 (0AE98C00) [pid = 5820] [serial = 200] [outer = 00000000]
10:04:04 INFO - PROCESS | 5544 | ++DOMWINDOW == 93 (0B876800) [pid = 5820] [serial = 201] [outer = 0AE98C00]
10:04:04 INFO - PROCESS | 5544 | ++DOMWINDOW == 94 (0B87B400) [pid = 5820] [serial = 202] [outer = 0AE98C00]
10:04:05 INFO - PROCESS | 5544 | 1477587845164 Marionette TRACE conn5 <- [1,326,null,{"value":["/XMLHttpRequest/open-url-base-inserted.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - insert ",0,null,null]]]}]
10:04:05 INFO - .
10:04:05 INFO - TEST-OK | /XMLHttpRequest/open-url-base-inserted.htm | took 530ms
10:04:05 INFO - PROCESS | 5544 | 1477587845208 Marionette TRACE conn5 -> [0,327,"getWindowHandle",null]
10:04:05 INFO - PROCESS | 5544 | 1477587845211 Marionette TRACE conn5 <- [1,327,null,{"value":"2147483652"}]
10:04:05 INFO - TEST-START | /XMLHttpRequest/open-url-base.htm
10:04:05 INFO - PROCESS | 5544 | 1477587845217 Marionette TRACE conn5 -> [0,328,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:04:05 INFO - PROCESS | 5544 | 1477587845301 Marionette TRACE conn5 <- [1,328,null,{"value":null}]
10:04:05 INFO - PROCESS | 5544 | 1477587845312 Marionette TRACE conn5 -> [0,329,"getWindowHandles",null]
10:04:05 INFO - PROCESS | 5544 | 1477587845314 Marionette TRACE conn5 <- [1,329,null,["2147483652"]]
10:04:05 INFO - PROCESS | 5544 | 1477587845319 Marionette TRACE conn5 -> [0,330,"switchToWindow",{"name":"2147483652"}]
10:04:05 INFO - PROCESS | 5544 | 1477587845323 Marionette TRACE conn5 <- [1,330,null,{}]
10:04:05 INFO - PROCESS | 5544 | 1477587845326 Marionette TRACE conn5 -> [0,331,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:04:05 INFO - PROCESS | 5544 | ++DOCSHELL 0B9EFC00 == 7 [pid = 5820] [id = 68]
10:04:05 INFO - PROCESS | 5544 | ++DOMWINDOW == 95 (0B9F0C00) [pid = 5820] [serial = 203] [outer = 00000000]
10:04:05 INFO - PROCESS | 5544 | ++DOMWINDOW == 96 (0B9F8400) [pid = 5820] [serial = 204] [outer = 0B9F0C00]
10:04:05 INFO - PROCESS | 5544 | ++DOMWINDOW == 97 (0BFE8800) [pid = 5820] [serial = 205] [outer = 0B9F0C00]
10:04:05 INFO - PROCESS | 5544 | 1477587845703 Marionette TRACE conn5 <- [1,331,null,{"value":["/XMLHttpRequest/open-url-base.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - ",0,null,null]]]}]
10:04:05 INFO - .
10:04:05 INFO - TEST-OK | /XMLHttpRequest/open-url-base.htm | took 530ms
10:04:05 INFO - PROCESS | 5544 | 1477587845749 Marionette TRACE conn5 -> [0,332,"getWindowHandle",null]
10:04:05 INFO - PROCESS | 5544 | 1477587845752 Marionette TRACE conn5 <- [1,332,null,{"value":"2147483652"}]
10:04:05 INFO - TEST-START | /XMLHttpRequest/open-url-bogus.htm
10:04:05 INFO - PROCESS | 5544 | 1477587845756 Marionette TRACE conn5 -> [0,333,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:04:05 INFO - PROCESS | 5544 | 1477587845822 Marionette TRACE conn5 <- [1,333,null,{"value":null}]
10:04:05 INFO - PROCESS | 5544 | 1477587845835 Marionette TRACE conn5 -> [0,334,"getWindowHandles",null]
10:04:05 INFO - PROCESS | 5544 | 1477587845838 Marionette TRACE conn5 <- [1,334,null,["2147483652"]]
10:04:05 INFO - PROCESS | 5544 | 1477587845841 Marionette TRACE conn5 -> [0,335,"switchToWindow",{"name":"2147483652"}]
10:04:05 INFO - PROCESS | 5544 | 1477587845845 Marionette TRACE conn5 <- [1,335,null,{}]
10:04:05 INFO - PROCESS | 5544 | 1477587845848 Marionette TRACE conn5 -> [0,336,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-bogus.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:04:05 INFO - PROCESS | 5544 | ++DOCSHELL 0CB0E800 == 8 [pid = 5820] [id = 69]
10:04:05 INFO - PROCESS | 5544 | ++DOMWINDOW == 98 (0CB12800) [pid = 5820] [serial = 206] [outer = 00000000]
10:04:05 INFO - PROCESS | 5544 | ++DOMWINDOW == 99 (0CCEB800) [pid = 5820] [serial = 207] [outer = 0CB12800]
10:04:05 INFO - PROCESS | 5544 | ++DOMWINDOW == 100 (0CF61000) [pid = 5820] [serial = 208] [outer = 0CB12800]
10:04:06 INFO - PROCESS | 5544 | [Child 5820] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/netwerk/base/nsIOService.cpp, line 778
10:04:06 INFO - PROCESS | 5544 | [Child 5820] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:\builds\moz2_slave\autoland-w32-d-000000000000000\build\src\netwerk\base\nsNetUtilInlines.h, line 180
10:04:06 INFO - PROCESS | 5544 | [Child 5820] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:/builds/moz2_slave/autoland-w32-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 2495
10:04:06 INFO - PROCESS | 5544 | 1477587846254 Marionette TRACE conn5 <- [1,336,null,{"value":["/XMLHttpRequest/open-url-bogus.htm",0,null,null,[["XMLHttpRequest: open() - bogus URLs (//[)",0,null,null],["XMLHttpRequest: open() - bogus URLs (ftp:)",1,"assert_throws: function \"function () { client.open(\"GET\", url) }\" did not throw","url/<@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:15:11\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nurl@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:13:9\n@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:19:7\n"],["XMLHttpRequest: open() - bogus URLs (http://a a/)",0,null,null],["XMLHttpRequest: open() - bogus URLs (http:////////////)",1,"assert_throws: function \"function () { client.open(\"GET\", url) }\" did not throw","url/<@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:15:11\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nurl@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:13:9\n@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:21:7\n"],["XMLHttpRequest: open() - bogus URLs (http://u:p@/)",0,null,null]]]}]
10:04:06 INFO - .....
10:04:06 INFO - TEST-OK | /XMLHttpRequest/open-url-bogus.htm | took 511ms
10:04:06 INFO - PROCESS | 5544 | 1477587846270 Marionette TRACE conn5 -> [0,337,"getWindowHandle",null]
10:04:06 INFO - PROCESS | 5544 | 1477587846273 Marionette TRACE conn5 <- [1,337,null,{"value":"2147483652"}]
10:04:06 INFO - TEST-START | /XMLHttpRequest/open-url-encoding.htm
10:04:06 INFO - PROCESS | 5544 | 1477587846277 Marionette TRACE conn5 -> [0,338,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:04:06 INFO - PROCESS | 5544 | 1477587846342 Marionette TRACE conn5 <- [1,338,null,{"value":null}]
10:04:06 INFO - PROCESS | 5544 | 1477587846352 Marionette TRACE conn5 -> [0,339,"getWindowHandles",null]
10:04:06 INFO - PROCESS | 5544 | 1477587846355 Marionette TRACE conn5 <- [1,339,null,["2147483652"]]
10:04:06 INFO - PROCESS | 5544 | 1477587846359 Marionette TRACE conn5 -> [0,340,"switchToWindow",{"name":"2147483652"}]
10:04:06 INFO - PROCESS | 5544 | 1477587846363 Marionette TRACE conn5 <- [1,340,null,{}]
10:04:06 INFO - PROCESS | 5544 | 1477587846368 Marionette TRACE conn5 -> [0,341,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-encoding.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-encoding.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:04:06 INFO - PROCESS | 5544 | ++DOCSHELL 0D410400 == 9 [pid = 5820] [id = 70]
10:04:06 INFO - PROCESS | 5544 | ++DOMWINDOW == 101 (0D734C00) [pid = 5820] [serial = 209] [outer = 00000000]
10:04:06 INFO - PROCESS | 5544 | ++DOMWINDOW == 102 (0D7B3C00) [pid = 5820] [serial = 210] [outer = 0D734C00]
10:04:06 INFO - PROCESS | 5544 | ++DOMWINDOW == 103 (0D8B6000) [pid = 5820] [serial = 211] [outer = 0D734C00]
10:04:06 INFO - PROCESS | 5544 | [Child 5820] WARNING: String ending in half a surrogate pair!: file c:\builds\moz2_slave\autoland-w32-d-000000000000000\build\src\xpcom\string\nsUTF8Utils.h, line 594
10:04:06 INFO - PROCESS | 5544 | [Child 5820] WARNING: String ending in half a surrogate pair!: file c:\builds\moz2_slave\autoland-w32-d-000000000000000\build\src\xpcom\string\nsUTF8Utils.h, line 495
10:04:06 INFO - PROCESS | 5544 | 1477587846779 Marionette TRACE conn5 <- [1,341,null,{"value":["/XMLHttpRequest/open-url-encoding.htm",0,null,null,[["percent encode characters",0,null,null],["lone surrogate should return U+FFFD",0,null,null]]]}]
10:04:06 INFO - ..
10:04:06 INFO - TEST-OK | /XMLHttpRequest/open-url-encoding.htm | took 570ms
10:04:06 INFO - PROCESS | 5544 | 1477587846850 Marionette TRACE conn5 -> [0,342,"getWindowHandle",null]
10:04:06 INFO - PROCESS | 5544 | 1477587846852 Marionette TRACE conn5 <- [1,342,null,{"value":"2147483652"}]
10:04:06 INFO - TEST-START | /XMLHttpRequest/open-url-fragment.htm
10:04:06 INFO - PROCESS | 5544 | 1477587846857 Marionette TRACE conn5 -> [0,343,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:04:06 INFO - PROCESS | 5544 | 1477587846932 Marionette TRACE conn5 <- [1,343,null,{"value":null}]
10:04:06 INFO - PROCESS | 5544 | 1477587846942 Marionette TRACE conn5 -> [0,344,"getWindowHandles",null]
10:04:06 INFO - PROCESS | 5544 | 1477587846944 Marionette TRACE conn5 <- [1,344,null,["2147483652"]]
10:04:06 INFO - PROCESS | 5544 | 1477587846951 Marionette TRACE conn5 -> [0,345,"switchToWindow",{"name":"2147483652"}]
10:04:06 INFO - PROCESS | 5544 | 1477587846955 Marionette TRACE conn5 <- [1,345,null,{}]
10:04:06 INFO - PROCESS | 5544 | 1477587846967 Marionette TRACE conn5 -> [0,346,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-fragment.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-fragment.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:04:07 INFO - PROCESS | 5544 | ++DOCSHELL 0D91F400 == 10 [pid = 5820] [id = 71]
10:04:07 INFO - PROCESS | 5544 | ++DOMWINDOW == 104 (0D91FC00) [pid = 5820] [serial = 212] [outer = 00000000]
10:04:07 INFO - PROCESS | 5544 | ++DOMWINDOW == 105 (0DAD8800) [pid = 5820] [serial = 213] [outer = 0D91FC00]
10:04:07 INFO - PROCESS | 5544 | ++DOMWINDOW == 106 (0DB44C00) [pid = 5820] [serial = 214] [outer = 0D91FC00]
10:04:07 INFO - PROCESS | 5544 | 1477587847428 Marionette TRACE conn5 <- [1,346,null,{"value":["/XMLHttpRequest/open-url-fragment.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - fragment identifier",0,null,null],["make sure fragment is removed from URL before request",0,null,null],["make sure fragment is removed from URL before request (with query string)",0,null,null],["make sure escaped # is not removed",0,null,null]]]}]
10:04:07 INFO - ....
10:04:07 INFO - TEST-OK | /XMLHttpRequest/open-url-fragment.htm | took 630ms
10:04:07 INFO - PROCESS | 5544 | 1477587847491 Marionette TRACE conn5 -> [0,347,"getWindowHandle",null]
10:04:07 INFO - PROCESS | 5544 | 1477587847497 Marionette TRACE conn5 <- [1,347,null,{"value":"2147483652"}]
10:04:07 INFO - TEST-START | /XMLHttpRequest/open-url-javascript-window-2.htm
10:04:07 INFO - PROCESS | 5544 | 1477587847505 Marionette TRACE conn5 -> [0,348,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
10:04:07 INFO - PROCESS | 5544 | 1477587847609 Marionette TRACE conn5 <- [1,348,null,{"value":null}]
10:04:07 INFO - PROCESS | 5544 | 1477587847669 Marionette TRACE conn5 -> [0,349,"getWindowHandles",null]
10:04:07 INFO - PROCESS | 5544 | 1477587847672 Marionette TRACE conn5 <- [1,349,null,["2147483652"]]
10:04:07 INFO - PROCESS | 5544 | 1477587847677 Marionette TRACE conn5 -> [0,350,"switchToWindow",{"name":"2147483652"}]
10:04:07 INFO - PROCESS | 5544 | 1477587847683 Marionette TRACE conn5 <- [1,350,null,{}]
10:04:07 INFO - PROCESS | 5544 | 1477587847702 Marionette TRACE conn5 -> [0,351,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-javascript-window-2.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-javascript-window-2.htm\", \"19784724-f293-4e82-930f-b4caf926a68e\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
10:04:07 INFO - PROCESS | 5544 | ++DOCSHELL 0DAC1400 == 11 [pid = 5820] [id = 72]
10:04:07 INFO - PROCESS | 5544 | ++DOMWINDOW == 107 (0DAC2800) [pid = 5820] [serial = 215] [outer = 00000000]
10:04:07 INFO - PROCESS | 5544 | ++DOMWINDOW == 108 (0E0D2C00) [pid = 5820] [serial = 216] [outer = 0DAC2800]
10:04:07 INFO - PROCESS | 5544 | ++DOMWINDOW == 109 (0E0DB000) [pid = 5820] [serial = 217] [outer = 0DAC2800]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 108 (0BFED400) [pid = 5820] [serial = 99] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-blob.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 107 (0D91F000) [pid = 5820] [serial = 129] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-chunked-trailer.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 106 (0D4E3000) [pid = 5820] [serial = 120] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-cookies.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 105 (0DAD9000) [pid = 5820] [serial = 135] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-error-state.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 104 (0D7B5400) [pid = 5820] [serial = 123] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-status.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 103 (0B873400) [pid = 5820] [serial = 96] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-upload-progress.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 102 (0AC9C000) [pid = 5820] [serial = 102] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-delete.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 101 (0D8B0400) [pid = 5820] [serial = 126] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-case-insensitive.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 100 (0DAB7000) [pid = 5820] [serial = 132] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-cookies-and-more.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 99 (0B9FC800) [pid = 5820] [serial = 93] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 98 (0DADA800) [pid = 5820] [serial = 159] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/open-during-abort.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 97 (0DDD7400) [pid = 5820] [serial = 162] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/open-method-bogus.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 96 (0E6AD400) [pid = 5820] [serial = 177] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/open-open-send.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 95 (0E1ADC00) [pid = 5820] [serial = 165] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/open-method-case-insensitive.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 94 (0D40F800) [pid = 5820] [serial = 174] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/open-method-responsetype-set-sync.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 93 (0E0D0800) [pid = 5820] [serial = 168] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/open-method-case-sensitive.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 92 (0DAC2400) [pid = 5820] [serial = 156] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/open-after-setrequestheader.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 91 (0C923800) [pid = 5820] [serial = 171] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/open-method-insecure.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 90 (0CF59C00) [pid = 5820] [serial = 153] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/open-after-abort.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 89 (0DB41C00) [pid = 5820] [serial = 138] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-server-date.htm]
10:04:08 INFO - PROCESS | 5544 | --DOMWINDOW == 88 (087A6000) [pid = 5820] [serial = 147] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/headers-normalize-response.htm]
10:04:09 INFO - PROCESS | 5544 | --DOMWINDOW == 87 (0AE95800) [pid = 5820] [serial = 141] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-special-characters.htm]
10:04:09 INFO - PROCESS | 5544 | --DOMWINDOW == 86 (0B9FAC00) [pid = 5820] [serial = 144] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-unsent-opened-state.htm]
10:04:09 INFO - PROCESS | 5544 | --DOMWINDOW == 85 (0AC9EC00) [pid = 5820] [serial = 150] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/interfaces.html]
10:04:09 INFO - PROCESS | 5544 | ++DOCSHELL 0879E800 == 12 [pid = 5820] [id = 73]
10:04:09 INFO - PROCESS | 5544 | ++DOMWINDOW == 86 (0AC9C000) [pid = 5820] [serial = 218] [outer = 00000000]
10:04:09 INFO - PROCESS | 5544 | ++DOMWINDOW == 87 (0AC9D800) [pid = 5820] [serial = 219] [outer = 0AC9C000]
10:04:09 INFO - PROCESS | 5544 | 1477587849855 Marionette TRACE conn5 <- [1,351,null,{"value":["/XMLHttpRequest/open-url-javascript-window-2.htm",0,null,null,[["XMLHttpRequest: open() - resolving URLs (javascript: